Skip to main content

Full text of "SS Werwolf Combat Instruction Manual (2018)"

See other formats


SS Werwolf 


Combat Instruction Manual 



Translation by Lt. Michael C. Fagnon 


Werewolf 


Tips for Guerrilla Units 


Contents 

I. The Guerrilla War 

A. Nature of Guerrilla Warfare. 01 

B. Organization. 02 

C. Command Principles.03 

D. Prospects of Success and Boundaries. 06 


II. Formation of Guerrilla Units 

A. General Requirements. 07 

B. Leaders. 07 

C. Men. 07 

D. Order of Battle. 07 

E. Armament.08 

F. Equipment. 09 

G. Clothing. 09 

III. Training 

A. Fundamentals. 10 

B. Utilization of Terrain and Camouflage. 10 

C. Navigation in Terrain. 15 

D. Reporting and Communications. 17 

E. Close-Quarter Battle. 18 

F. Roadblocks. 19 

IV. Tactics 

A. Reaching the Operational Areas.27 

B. Selection of Targets for Destruction and Combat.... 29 

C. Reconnaissance and Intelligence. 29 

D. The March. 31 

E. Checkpoints for Planning. 33 

F. Interdiction Operations. 33 

G. Ambush. 35 

H. Raids.39 

I. Disengagement. 40 

J. Securing the Rest Area. 42 





























K. Protection Against Countermeasures 


43 


V. Action Against Enemy Agitation. 44 

VI. Accommodation and Food Supply 

A. Shelters. 46 

B. Heating and Cooking Fires. 50 

C. Water. 51 

D. Latrine and Waste. 51 

E. Food Supply, Sustenance. 51 

F. Emergency Rations. 54 

Appendix 1: Guidelines for the Equipment of the Guerrilla 

Soldier. 55 

Appendix 2: Instructions for the Use of the March Compass. 57 

Appendix 3: Airborne Operations.58 

Appendix A: Digital and Modem Methods.59 

Appendix B: Modem Weapons Outline 


Appendix C: Enemy Tactics and Guerrilla War 















I. The Guerrilla War 

1. Nature of Guerrilla Warfare 

The guerrilla war that is conducted in a hard, determined fashion, and with clear political aims, is 
an effective means to assist one’s own military, and political struggle, and to harass and paralyze 
the enemy's war effort, economy and politics through military subsidiary actions. In the guerrilla 
war the lack of numbers and material is compensated for through special combat tactics, better 
knowledge of the land, daring decisions, cunning deception and utmost determination. 

The guerrilla war is not a momentary substitute, but an essential part of modem warfare. In 
desperate situations it is the ultimate means to defend freedom and life of nation to the utmost. 
Conducted conjunction with general military operations, clear political objectives and qualified 
means the guerrilla war can lead to success of decisive importance. This is particularly the case 
in a long war and in times of political upheaval. 

The guerrilla war is conducted in the frontline, the flanks, but most of all in the rear of the enemy 
and his country, in enemy occupied areas and in countries that are allied with the enemy or are 
important to his war effort, economy and politics. 

Aims of guerrilla warfare are: 

a) To harass, lie down and destroy enemy forces. 

b) To harass and destroy the enemy’s supplies, his transport means, his communications 
network, and his industrial and supply facilities. 

c) To exterminate all the enemy’s helpers and fmstrate all enemy measures through mthless 
combat. Violence against terror! 

d) To support any regular army reconnaissance, intelligence and espionage. 


1 



2. Organization 

The organization of guerrilla warfare has to adapt to the war situation, the terrain and the extent 
of control that the enemy exerts over the operational area. 

a) The guerrilla war is supported by frontline troops through raids, reconnaissance patrols 
and special assault detachments. Cut off units, groups of stragglers and soldiers on 
evasive action also support. 

These missions in the frontline area are mostly of short duration. Every arising 
opportunity for such guerrilla action must be exploited quickly and skillfully by all units 
of the Wehrmacht. The troops are to be educated to solve these tasks by resourceful 
improvisation. 

b) It is the task of special assault detachments to bring combat action to the enemy’s rear 
area through carefully planned and far-sighted missions. These missions are the backbone 
of guerrilla warfare. Special assault detachments are also used to unleash and support the 
fight of local resistance groups. 


c) Originating out of the population, the guerrilla war is conducted by local resistance 
movements. Without support from the population or an armed power resistance groups 
cannot sustain themselves for long. This support must therefore be achieved and held by all 
means. 


The strength of employed units must be kept limited so that maneuverability as well as the 
potential to hide camouflage and rigidly direct command and control are maintained. It is 
therefore better to form new independent units instead of enlarging existing ones. 

Guerrilla warfare can only be executed with a large number of small units independently 
employed, but under one command. 


2 



3. Command Principles 

The most important command principles for guerrilla warfare are the combination of clear 
methodical planning with ruthless daring in the execution of an operation. Careful and thorough 
examination of the possibilities for success is necessary when initiating the guerrilla war. 

The guerrilla war is executed in 3 stages: 

a) When beginning the guerrilla war, it is necessary to limit action to passive resistance, 
one-man operations, or smallest size guerrilla groups, especially if the situation is 
unclear, the terrain unfavorable, or it the enemy exerts tight observation and control. At 
this stage secret harassment and destruction missions have the priority over combat 
actions. 

b) Missions of guerrilla groups, and guerrilla platoons in the strength of several guerrilla 
groups, with combat and larger destruction missions are only possible in favorable terrain 
with the support of the population and when the general situation is clearly understood. 

c) The last stage of the guerrilla war is the deployment of the guerilla task forces. This is 
possible in weakly secured areas, with the help of the population or the regular army, or 
with enduring support and resupply by air. 


Larger unit stages must include the foregoing. It must be avoided, that when operations of larger 
units are instituted, that those of the small and smallest units are stopped. 

Greatest care must be taken when converting from the combat form of the last siege of guerrilla 
war to the general uprising of the population, and thus to the form and style of regular war. 

Premature timing for the uprising of the concentrated popular masses can destroy all 
achievements that have been won by guerrilla warfare up till then. 

In general planning as well as with each mission, the command must be dedicated to avoiding 
serious setbacks, because in guerrilla warfare setbacks are much graver than in regular warfare. It 
is especially important to avoid open confrontation with the superior enemy forces. After a 
successful raid and immediate far-reaching withdrawal is advised. 

Thorough reconnaissance is the prerequisite in order to avoid superior enemy forces and choose 
profitable targets. The guerrilla war can only be conducted if one’s own reconnaissance is 
superior to that of the enemy. This is ensured by skillful use of scouts, through help from the 
population, but most of all by using informants along with an excellent information and 
communications network. Knowledge of the country and local area will simplify reconnaissance 
and often make difficult and enduring exploration unnecessary. 

Careful planning must unite itself with ruthless and daring boldness when carrying out a mission. 
Untiring and never lessening aggressiveness and activity are the most important prerequisites of 
success. The enemy must be hit, and the initiative taken again and again. Defensive actions are 
only a last means of self-defense in guerrilla warfare. 


3 



Surprise over the enemy is achieved by secrecy, cunning in planning and daring raids. Surprise is 
the queen of the art of the guerrilla warfare. Greatest possible maneuverability of the small 
guerrilla units, avoiding all patterns, using tricks and ruses, exploitation of darkness and terrain, 
quick comprehension and mastering of situations, careful camouflage, ambushes, raids and secret 
destruction missions are the means by which surprise is achieved. 

Psychological warfare must go hand-in-hand with combat activities. Every possibility to waken 
and strengthen the will for resistance in the population, to wear down the enemy’s morale and 
undermine his prestige must be used. The choice of the operational area for guerrilla units is the 
task of the higher command. Points to be considered are: 

a) The requirements of the political and regular army high command; 

b) The result of reconnaissance and intelligence; 

c) The suitability of terrain; 

d) The possibilities for resupply. 

a) The requirements of the regular army high command are the most important 
considerations in guerilla warfare. 

The following tasks may be assigned: 

aa) To initiate and support the local guerrilla warfare ambitions in the enemy’s sphere of 
influence as a means of political pressure and to disrupt his war industry. 

bb) Obstruction of the enemy’s troop deployment. 

cc) Preparation of the guerrilla unit's own, far-reaching attack operations through local 
reconnaissance, as well as harassment of the rearward connections of the enemy. In the last days 
and hours before the attack, these activities should be increased up to a temporary paralyzation of 
enemy command, control and communications centers as well as massive interruption of 
trafficways. In the further course of the attack, the guerrilla units can be of valuable assistance to 
the advancing friendly troops. 

dc) Cover of retrograde operations of the friendly forces through actions against the flanks 
of pursuing enemy attack spearheads, and against the supply lines of the enemy, that are 
lengthened in the course of his attack, and thus are vulnerable targets. 

ee) Combat with all means to gain time in periods of weakness and after serious attacks in 
regular war. After a collapse and in seemingly hopeless situations, this fight in the areas where 
the enemy is most vulnerable must under ruthless self-sacrifice be increased to the utmost 
effectiveness. 

b) The result of their own and the regular army reconnaissance gives the guerrilla command 
information as to how far the requirements of the regular war high command can be 
satisfied and where especially valuable targets are found. Often the guerrilla command 
will exploit political or military possibilities for combat actions independently. 

c) The sustainability of terrain in the planned operational area must be determined through 
reconnaissance or judged by men familiar with the country, because it strongly 
determines the combat possibilities and combat forms. 


4 



d) The attitude of the population is of equally large importance for the choice of the 
operational area. A hostile attitude can make operations even against important targets, 
almost impossible. Sufficient support from the population on the other hand makes 
missions against a number of less valuable targets profitable because of the accumulating 
effect. 

e) The possibilities of resupply, by land, by sea or by air, must be considered thoroughly. 
They are contributory factors for the choice of the operational area and of prime 
important for the length of operations. 


5 



4. Prospects of Success and Boundaries 

The prospects of success by means of guerrilla warfare are determined by the political, military 
and economic situation, the terrain, population density, traffic infrastructure, national 
characteristics and religious habits, the attitude of the population and most of all, by the 
toughness and combat effectiveness of the employed guerrilla units. 

Without a clear political will, the guerrilla war can achieve only temporary success, even if 
conducted with tactical skill. On the other hand, quick and lasting consequences can be expected, 
if the political and military high command recognize and exploit the advantages that the guerrilla 
operations have achieved. This must be done in timely fashion and with utmost determination. 

The necessity of a reliable support network through secret assistance by the population in the 
operational area, dependence on help through strong friendly forces or continuous resupply by 
air, sets certain boundaries for the prospects of success of guerilla warfare. 

The terrain strongly determines the possibilities and combat means of the guerrilla war. Covered 
strongly undulated terrain with insufficient traffic infrastructure, poorly passable terrain, and 
most of all wooded areas and mountains assist guerilla missions. Open terrain with high 
population density and a well-developed traffic infrastructure presents great problems for the 
conduct of guerrilla warfare. Large cities and industrial areas offer after adequate adaptation of 
the organization forms, good possibilities for guerrilla actions. This is especially the case in the 
ruins of destroyed larger settlements. 


6 



II. Formation of Guerrilla Units 

1. General Requirements 

In the guerrilla war, it is not the strength of the employed units and the mass of their weapons 
that give success, but the inner strength of the guerrillas, their daring craftiness and ingenuity in 
exploiting all favors of the terrain and helpful means. When forming and reinforcing guerrilla 
units, consideration must be taken of these factors. Still able are volunteers who besides 
enthusiasm and willingness have the doggedness, toughness and ingenuity needed. Gaps in their 
military training can be closed. The variety of tasks performed by a guerrilla unit makes it 
necessary that it not only include good soldiers, but also men with technical and practical skills, 
and such with political and propagandistic abilities. 

2. Leaders 

The correct choice and training of the leaders is of decisive importance. The leader of a guerrilla 
unit should be demanding of himself and others, when conducting his mission. On the other 
hand, he must provide never-ending concern for the welfare of his men, this maintaining the 
battle-worthiness of his unit. His daringness as a combatant, his leadership success and his 
unconditional fairness must waken confidence. Confidence is the fundamental of leadership in 
guerrilla units. The authority of the leader rests solely on his personality, not on rank and 
insignia. The leader of a guerrilla unit carries a high measure of responsibility. He has the same 
rights as the commander of an independently operation battleship, and he may impose any 
punishment — even death — to keep up discipline. 

Besides military proficiency and personality, a feeling for political and propagandistic 
possibilities is of high value for the leader of a guerrilla unit. 

3. The Men 

The guerrilla must be an excellent soldier and unite the capabilities of an infantry man with those 
of an engineer. Furthermore, his mission requires from him a close relationship to nature, 
frugality and ingenuity in the exploitation of all means and makeshifts available. Through his 
behavior towards the population, he must win the confidence and respect of all freedom-loving 
people. Weaklings and traitors fear him like the plague. It is important that a large number of the 
men know the operational area and are in command of the language of the country, yes even of 
the local dialect. Acquiring and training radio operators in due time must not be neglected in any 
case. Even women may be suitable. 

4. Ol der of Battle 

The strength of the guerilla unit must adjust itself to the enemy situation, the mission and the 
terrain. In areas under tight observation and with insufficient cover and concealment, it is only 
possible to operate in smallest-size groups, which at the utmost may temporarily be united for a 
common mission. In sparsely occupied areas or terrain with good possibilities for cover and 
concealment, stronger units can hold themselves. But even these units must always be structured 


7 



into groups and platoons. The smallest independently operating unit is the guerrilla group. It 
consists of 1 leader and 4 guerrillas. Under difficult circumstances and for special tasks, 
reconnaissance or destruction missions, even smaller guerrilla teams may be employed. 
Formation of stronger groups is of doubtful usefulness. The guerrilla platoon consists of several 
guerrilla groups and a command squad with an overall strength of 10 leaders and 40 guerrillas. 
Guerrilla platoons are to be employed where terrain and the enemy situation permit it. In 
especially favorable situations, for example in poorly secured, densely wooded, or mountainous 
areas and when the guerrilla unit’s effect on the situation in the operational are has progressed 
sufficiently, guerilla task forces which consist of several platoons, are to be formed. The 
following assignment of command tasks has proven itself effective for larger guerrilla platoons 
and guerrilla task forces. 

a) Leader 

b) Leader of the reconnaissance service and the command squad 

c) Leader for political questions 

d) Leader of the signals squad 

e) Weapons and material warder 

f) Doctor or medical orderly 

g) Cook 

h) Mess sergeant and accountant 

In smaller guerrilla platoons, several tasks must be united. A back-up must be named and 
instructed in the tasks so that casualties do not cause interruptions. When the guerrilla 
warfare has grown to have even greater importance in an area a local secret command 
staff must be set up. Liaison officers are to be attached to it. 

5. Armament 

The armament of the guerrilla units must be light. It must not hinder maneuverability, but 
on the other hand should enable a destructive firepower in worthwhile close-range 
targets. In the guerrilla groups some of the guerrillas must be therefore equipped with 
rifles. Pistols and daggers may also be of value. Hand grenades are indispensable. 
Additionally, depending upon the mission, explosives are added to the equipment. It is 
very advantageous to use a suppressed weapon and to have a sniper rife. Also, some of 
the weapons should be equipped with luminous sights. It may become necessary to equip 
the guerrilla platoons with several machine guns and bazookas for certain missions. 
Especially in the mountains, it is advantageous to take along mortars. Depending upon 
the situation and the mission, guerrilla task forces must carry heavier high angle- and 
anti-tank weapons. A uniform caliber of the armament is important because of 
ammunition resupply. Especially suited are all weapons with calibers that are common in 
the operational area. Supplementation and replacement of arms through procurement of 
enemy weapons is always a good policy. In difficult supply situations, raids to obtain 
weapons and ammunition must be conducted. 



6. Equipment 

The equipment of the guerrilla soldier and the whole guerrilla unit must be adapted to the 
circumstances and the situation in the operational area. It must be so light that 
maneuverability is not restricted. Appendix 1 may serve as a guideline. It is best to carry 
the most necessary equipment pieces directly on the body, so that the guerrilla is still 
combat ready after losing or having to temporarily hide his rucksack. All pieces of 
equipment that are not constantly carried along must be hidden in concealed caches in the 
operational area. Suitable waterproof containers are needed, therefore. 

7. Clothing 

The clothing must be adapted to the climate of the operational area, the task, and the 
duration of the mission. The uniform common with the infantry ranger units of the Army 
is best suited. Except in large towns, the clothing of the peasant population in the 
operational area may always be used in emergencies. Kidney warmers are good to keep 
healthy. It has proven useful to take along several thin undergarments instead of one thick 
one. Thus, several different layers can be worn over each other, enabling a better 
adaption to the existing weather. The clothes must be impregnated against lice. Shoes 
with rubber soles, or sports shoes, are useful for special missions. 


9 



III. Training 
1. Fundamentals 

Good infantry training is of great value to the guerrilla. Where it is lacking, the most 
important branches must be taught to mend. Weapons training, marksmanship, utilization 
of the terrain and combat training, close-quarter tank destruction and guerrilla battle 
techniques in squad, group and platoon formations must be taught. Furthermore, engineer 
training is necessary to the extent that each guerrilla has a basic knowledge of installing 
barriers and obstacles and can work with demolitions. As many guerrillas as possible 
must be instructed in the special field of destruction and sabotage techniques. A practical 
instruction in first aid is indispensable because of the possibilities of becoming wounded. 
The following principles must be held as valid for all training phases: 

All branches must be adapted to the special requirements of guerrilla warfare, living in 
the field and night combat. Everything not necessary must be dispensed with. Important 
aspects must be repeated again and again. It is more important to maximize 
maneuverability, the capacity to adapt, the ingenuity and the "hunter” instinct than it is to 
drill the men. 

2. Utilization of Terrain and Camouflage 

Proper utilization of the terrain and camouflage will enable one to find concealment form 
the enemy in order to deceive, dupe and surprise him. One must offer only the very 
smallest and poorly visible target possible in case of discovery. Camouflage against air 
view must never be forgotten. Utilization of the terrain requires the skillful use of all 
possibilities of cover and concealment, and consideration of the color of the back and 
underground. 

Sunlight and shadows must also be considered. The guerrilla must always be intent on 
offering only a small target. Camouflage is achieved by adapting to the surroundings with 
the help of natural and artificial means and by avoiding noticeable movements. The 
following points concerning cover and concealment must be remembered: 
a) Cover for campsites, halt and rest areas during the march and when advancing is 
offered by mountains, hills, boulders, valleys, gulches, forests, hedges, bushes, corn¬ 
fields, houses, bams, walls, fences ditches, dirt piles etc. 

The guerrilla sneaking up on enemy guards must make use of even the smallest 
depressor, furrow, dirt and rock-pile, mole mound and grass bundle for cover and 
concealment (Picture 1). 


10 



Right! 


Wrong! 




•r u 

• ** 



Picture 1. Utilization of small cover 


b) Consideration of the color of the back and underground is necessary: for example, the 
grey-green uniform offers no camouflage against light yellow-colored sand. 
Especially to be considered is the contour against the sky which the guerrilla offers to 
the eye of the enemy when advancing over hills and even the smallest elevations. 
This contour effect is not only a give-away at daytime, but also during bright nights 
(Picture 2). 


Right! Wrong! 



Picture 2. Consideration of back and underground 


11 










Right! Wrong! 



c) The most important natural camouflage means are: small trees, twigs, grass, moss, 
wheat, herbs, leaves etc. Face and hands must be subdued with dirt, soot or grease 
paint in the winter, with blackboard chalk or flour. When camouflaging campsites, it 
is advisable to replant small trees, bushes, grass and moss. The camouflage thus 
becomes more natural and does not wither as fast. 

d) The most common artificial camouflage means are: the tent canvas, blankets, 
camouflaged uniforms, camouflaged poncho shirts, large camouflaged nets to cover 
foxholes etc., and small camouflage nets to cover the face and the shoulders. 
Camouflage poncho shirts and snow poncho shirts are easily self-made. Old clothing 
pieces, fishing nets and rope are also of value. These artificial camouflage means may 
be supplemented with natural means like twigs, grass etc. Different colored rags, 
bundles of bush and paper can be tied to nets. It is useful eyelets and bands to the cap, 
so that camouflage may be quickly attached and changed (Picture 5). 


13 





Picture 5. Small camouflage net 

e) Avoiding all sudden movements is part of camouflaging. At dusk and in the dark only 
quick movements and sounds are noticeable. The following rules must be followed: 
Always remember: How does the enemy now see me? Don't forget to adapt your 
camouflage to your surroundings! Avoid sudden movements! They destroy all 
camouflage efforts. And pay attention to shape, shine and shadow. 


14 



1. Navigation in Terrain 

The simplest way to navigate in terrain is to know the operational area thoroughly. The 
guerrilla must therefore be taught to remember special orientation features that are easily 
recognized by day (dominant heights, church towers, factory chimneys, single trees, field 
bams, groups of boulders etc.). In order to orientate himself at dusk and in the night. He 
must remember their contours. He must also memorize dominant lines which can serve 
him as conduction lines during night marches. Such lines are fences, walls, hedges, 
waterways, high-tension power lines, forest edges, dams, railways, streets, tracks etc. 
When conduction lines and orientation points can easily be mistaken for others, 
additional features must be memorized for verification so that mistakes are mled out. In 
uniform terrain, especially in forests, orientation points and conduction lines are very 
important. At cross-roads, for example, the guerrilla must memorize the specific features 
in order to find the right way. Gaps in the skyline, dominant treetops, path starting points 
etc. serve as additional reference verification signs at uniform forest edges. Certain 
important distances should always be estimated and memorized together with the 
conduction lines and orientation points. Evaluation of the number of steps from one 
orientation point to the next also is a good means of easily finding the right way at night. 
When using a map to plan a night march, orientation points and conduction lines can be 
memorized with its help. This helps to avoid having to use a light when referring to the 
map in the dark. If the terrain is totally unknown, or if the guerrilla is lost, the first step in 
order to find the right way is to determine the navigational directions. The following 
principles may be used: 

a) The position of the sun is fairly accurately in the east at 0600 hours, in the southwest at 
1500 hours and in the west at 1800 hours. 

b) A good method to determine the southern direction is by the use of the watch. Hold the 
watch level and point the small hand towards the sun. When the angle between the hour- 
hand and the 12 is cut in half, this line, extended forward before noon and backward in 
the afternoon, points south (Picture 6). 


15 




Picture 6. Determining the Southern Direction with the Pocket Watch 
Left: Morning 0600h Right: Afternoon 1500h 

c) At night the northern direction is found with the help of the North Star. It is found 
by extending the distance between the rear two stars of the Big Dipper approximately 
5 times (Picture 7) 



Picture 7. North Star and Big Dipper 
1. North Star 2. Big Dipper 

d) At night the directions can also be determined by the position of the moon: the full 
moon is exactly opposite the sun and thus in the southwest at 0300 hours and in the 
west at 0600 hours. The first quarter of a waxing moon stands where the sun was 6 


16 




hours ago: for example, in the west at 2400 hours. The last quarter of a waxing moon 
stands where the sun will stand after 6 hours; for example, in the east at 2400 hours. 
In order to determine one’s own position with the help of a map, it must first be 
aligned with the true north with the help of the sun or one of the other means; then the 
surrounding area is checked for terrain features that are easily found on the map 
(streets, churches, dominant hills etc.). These points are then compared with the 
picture of the map so that one’s own position can be ascertained. Determination of a 
certain terrain point is achieved as follows: Mark your own position on the map, 
choose a clearly visible terrain feature that is not too near (e.g. church) and align the 
map to it. The upper edge of the map now points north. If other terrain features are 
sighted along a line marked from one’s own position with the help of a ruler or 
pencil, the line on the map must lead to the wanted terrain point. The difficulties of 
navigating in unknown terrain, especially in forests and at night, make it necessary 
that every guerrilla learn how to use a compass. When using a compass, hold it away 
from steel and iron objects (e.g. gun) as far as possible because the needle will 
otherwise be deflected. With the help of the compass, maps can be aligned with true 
north, directions may be determined, and a plotted course can be maintained with the 
help of a compass bearing. The compass, next to the sun is the most practical means 
by which to navigate. Each guerrilla must therefore be trained in its use. Help 
therefore is given in Appendix II. 

5. Reporting and Communications 

Reliable, quickly transmitted reports and messages are fundamental to the security 
and command of the guerrilla unit. The guerrilla must be taught to observe attentively 
and to avoid unclear and exaggerated statements. He must transmit or deliver 
important messages quickly. Signals that are clearly visible or well understood over 
long distances are best suited to transmit simple messages, warnings and orders. They 
must be arranged well in advance and changed from time to time. Too many signals 
with various meanings are to be avoided. They can cause more confusion rather than 
help. It is especially important to arrange signals with the sympathizers in the 
population. These signals mostly serve as a warning. Such signals may be: opening or 
closing certain attic hatches, windows or shutters, opening or closing of curtains, 
hanging out of wash or unsuspicious clothes, putting on lights in certain rooms and so 
on. These signs can mean: “Danger of Enemy.” “No danger.” “Enemy in the village.” 
Or “Enemy in the house.” They can also indicate that the sympathizer has an 
important message for the unit. All guerrillas acting as observers, scouts or guards 
must consider the following points when reporting: Can the message be given with a 
signal? Is it necessary to send a messenger? Is it necessary to draw a sketch? All oral 
or written messages must be checked for the possibility of sending a part of the 
message immediately with a simple sign. 


17 



This is especially important for warnings. Written messages must be avoided as much as 
possible. All messages must clearly state: What have I seen myself? What has a comrade 
noticed? Which reports are from the population? What is speculation? Reports from the 
population must have indication as to how trustworthy the message seems; presumptions must be 
explained. It must always be considered that even calm men cannot observe clearly during a 
combat situation and tend to exaggerate due to excitation. The following points must be 
followed: When was the observation made? What was observed (e.g. a platoon, 2 cannons etc.)? 
Which enemy activity was observed (determine the exact position)? The further intention of the 
message’s sender must always be included. Each messenger and courier must know to whom the 
message is addressed, where he will find the addressee, and what he must do if he cannot find 
him, and respectfully after he has delivered the message. He must memorize the contents of the 
message so that he can destroy the message when in danger. The messenger must not give away 
the position of the leader’s perimeter through wrong conduct. He must detour and cut back very 
often. Written messages should not be signed nor have an address on them. Simple signs are 
sufficient. Code names and abbreviations used in the guerrilla unit may also be employed. 
Messages from helpers out in the population can be hidden in predetermined “mailboxes,” Well 
suited for this purpose are: hollow trees, cracks in walls etc. When using such mailboxes, it is 
advisable to agree on a sign in the vicinity indicating that a message has been left. This helps to 
avoid having to check the dead mailbox. Use of flashing signal lights is only possible if the 
enemy situation permits it. In the mountains, they are of use in order to avoid difficult, time- 
consuming message deliveries through to the valleys. Care must be taken that these flashing 
messages are coded. It is best to use only short signs. Long enduring blinking should be avoided. 
Pigeons may be given to reconnaissance patrols in order to bring important messages to the 
higher command. Radio transmission is indispensable in a guerrilla war when lacking other 
technical means of communications. Training of good radio operators in due time and far-sighted 
acquisition of replacements must never be neglected, even when lacking sufficient number of 
radio sets at the moment. Employment of women for this task is possible. 


5. Close-Quarter Battle 

The training in close-quarter battle must be conducted in a guerrilla-like, sporting way. It should 
enable the guerilla to: a) fight with the spade, dagger or without a weapon and not depend solely 
upon his firearm, b) overwhelm an enemy silently when encountering him unexpectedly 
(especially at night), c) overwhelm a guard silently, d) break a hold and deliver defensive blows 
and punches. Often the whole mission depends upon overcoming the enemy silently, during an 
unexpected encounter or when disposing of a guard. Close-quarter battle must therefore be 
practiced again and again. Strict regulations cannot be given, but when disposing of a guard, the 
following points must be observed: Only specifically skillful guerrilla should be employed for 
the task. Leave unnecessary equipment. Wear shoes with rubber soles or sports shoes or take off 
your boots. Sneak to a secure position near the guard and study his habits, then sneak to the place 
best suited for the attack. When jumping on the guard and hitting him, make sure he cannot cry 
out. Depending upon orders, drag the guard away or dispose of him. Take away papers, weapons, 


18 



equipment etc. Disappear quickly or carry on with your mission. When practicing breaking a 
hold, it is important that the guerrilla leams to react energetically and quickly so that he is able to 
overwhelm an enemy who is superior in constitution. It is not necessary for the guerilla to know 
a large variety of close-quarter battle methods. It is better that those which suit him best become 
second nature. Blows and punches against vulnerable parts of the body are mostly executed with 
the fist or the edge of the hand. Kicks against the knee or shins can drop an enemy to the ground 
before he is able to react. The following parts of the body are best attacked with blows and 
punches: Temple, base of the nose, upper lip, neck, Adam’s apple and back of the neck; Main 
arteries, heart, kidneys, groin. 

6. Roadblocks 

Roadblocks are an important means of guerrilla warfare. They are employed together with 
ambushes to hinder pursuit by motorized troops and to harass enemy traffic. The effectiveness of 
obstacles can be multiplied through the use of hidden explosive charges. The guerrilla group 
must always be able to set up simple roadblocks with the means available. Training must enable 
the guerrillas to choose and build an obstacle best suited for the number of men and means 
available. When ambushing on heavily frequented roads, obstacles in the form of mines must be 
employed. These should be detonated electrically or by trip wire (Picture 8). 



19 



To hinder pursuit or in harassment operations, antitank mines or improvised mines with pressure 
or relief-pressure. 



Picture 9. Notches for the Direction of Fall 


20 




Picture 10. Tree Blockade 


21 










Detonators may be used successfully. Mines must always be carefully camouflaged. Destruction 
of bridges made of iron, masonry, or wood by demolition, requires considerable amounts of 
explosives and a thorough instruction in handling of explosives and fuses and in calculating the 
charges. This is a subject of special instructions and regulations. Even without explosives and 
mines, guerrilla groups can set up obstacles that will efficiently hinder the enemy: 

a) Single trees are chopped down so that a stump of about 1 to 1 14 meter’s height is left 
standing. The treetop must fall in the direction of the enemy, and the whole width of the 
street must be obstructed (Picture 9). 



The direction in which the tree should fall is determined by a notch (1/5 to 1/3 of the diameter). 
Saw cuts should end in this notch. Jamming of the saw is avoided by using a wedge. 


22 



The growth of the tree and branches of other trees may influence the direction in which the tree 
falls. In this case, push with sticks or pull with ropes in the direction necessary. (Picture 9) 


b) Tree blockades are made by cutting down trees over a distance of 20 to 30 meters. The trees 
should fall crosswise over each other, with the treetops towards the enemy and outwards so that 
visibility into the obstacle is obstructed. Only tress in favorable positions are cut (Picture 10). 

c) Wire obstacles are set up at an angle to the road axis with the height of 1 to 1.20 meters using 
strong trees and with additional anchorage by strong pegs. Wire obstacles are very efficient 
against cars and motorcycles (Picture 11). 






d) Destroying a road: The road is dug out over its complete width, 2 to 3 meters wide and 1 
meter deep. The earth is thrown down the embankment (Picture 12). This obstacle is very 
effective in mountains on roads that run along slopes. Repair of the street is complicated if the 
bottom of the ditch is angled downhill (Picture 13). 



Picture 13. Destroying a Road 

e) Wrecking of wooden bridges is sufficiently effective if the planks and support beams of some 
parts of the whole bridge are removed. Destruction is completed by sawing through or removing 
the supports. The wood must he removed or rendered useless by chopping or cutting it. Against 
armored vehicles and light reconnaissance tanks, the wrecking can be camouflaged by sawing 
the beams only halfway through. The bridge will collapse after a vehicle has driven on it. 

f) It requires a long time to prepare the incendiary destruction of wooden bridges. The fire must 
be nourished from below. Therefore, a large quantity of inflammable material like tar, pitch, oil, 
gasoline, petroleum, straw etc. is necessary and must be fastened under every beam and all 
supports. Hanging or setting up containers (barrels, Jerry cans) filled with tar, petroleum, oil etc., 
directly under the planks, pouring engine oil over the bridge before igniting it and so forth, 
accelerate the destruction. Sufficient draft is created by removing some planks. Destruction of a 
bridge by burning it down requires 5 to 10 hours. Long lasting obstruction of a road is achieved 
by erecting several echelons of barriers in depth. The effect of barriers is multiplied by phony 


24 




obstacles. They must be identical to real barriers. Phony barriers should be erected in connection 
with the real ones or in alternation with real ones. A phony barrier will only be effective if the 
enemy notices it and if he has encountered a similar real obstacle before. If mines have already 
exploded in the direction of the enemy, motor vehicles will be easily stopped by a simple wire or 
wire rope, a conspicuous sign on the road, fresh tar spots on the asphalt of the road, brushed 
spots on cobblestones, freshly repositioned cobblestones, dug up and refdled holes, iron pieces or 
pieces of wooden planks placed on earth, wires leading into the earth near chopped down trees. 


25 



When setting up phony barriers, a great variety should be tried. In general, the following 
fundamentals must be observed when setting up barriers: 


a) It should not be possible to bypass the barrier. 

b) The enemy should come upon the barrier unexpectedly (behind curves, bushes etc.) 

c) The barrier should be watched and be under control by one’s own fireteam or reinforced 
through hidden charges. 

Large barriers (tree blockades, destruction of roads, wrecking and burning of bridges) 
which require more men and longer time can only be accomplished under favorable 
circumstances. Help of the population is mostly necessary. When laying mine barriers, 
care must be taken that other persons do not observe the work. 


26 



IV. Tactics 


1. Reaching the Operational Areas 

a) By staying behind operations. This possibility is only given in mobile warfare and 
during enemy offensives. It is most favorable if the guerrilla unit can stay behind in 
the predetermined operational area. If this is not possible, it is very important to 
choose an area within the battle zone out of which the guerrilla unit can march into 
the operational area under greatest possible cover and concealment. It is very difficult 
or almost impossible to stay behind in areas where the points of main battle effort are. 
Supply and weapons caches must be set up in due time. The guerrilla unit hides itself 
in well-camouflaged fox-holes (Picture 14), dense, vast pine forests, field-ruins, 
cellars etc. in order to stay behind. 

b) Secret passage through enemy lines in times of static battle action. If circumstances 
permit, the whole guerrilla unit must infiltrate to a favorable sector at a favorable 
time. Friendly troops must support them with all means available. Suited therefore are 
quiet sectors of the front line that are secured mainly by fortified strongpoints, 
densely wooded terrain, out of which concealed routes into the operational area can 
be found. Dark nights and favorable weather: rain, fog, snow and gusty winds, must 
be exploited. Field-ruins, mining installations and other complex build-up industrial 
districts are hard to oversee and also favor infiltration. A rendezvous point (RV) with 
good cover and concealment must be arranged if the guerrillas are to pass through 
enemy lines on their own. A RV is also important and therefore must be ordered if the 
unit is forced to disperse. 


27 





A certain waiting period must be ordered for the RV. Instructions must be given in the case that a 
guerrilla comes late. After the successful passage through enemy lines, the guerrilla unit must 
cautiously advance into the enemy’s rear area as far as possible and lay up in a good hide-out 
before dawn. 

c) Forced passage. 

Where a secret passage through enemy lines is not possible, an attack of temporarily united 
guerrilla units through enemy lines may be in order. In some cases, such attacks may be 
conducted solely for this purpose. Daring thrusts of tank packs into the enemy’s rear promise 
success in some cases. The guerrillas will dismount where there is possible undercover. All 
forced passages are difficult and therefore only to be used as a last possibility. 

d) Over water or through the air by parachute drop or air landing in the operational area or near it 
(See Appendix 4). All identification papers, letters, photos and anything else that may give the 
enemy intelligence clues must be turned in prior to the mission. False, misleading documents and 
papers may be taken along. It is also necessary that the guerrilla memorize a well-planned cover 
story (past life, family, mission, own unit) so as to deceive the enemy’s intelligence. 

2. Selection of Targets for Destruction and Combat 

In most cases, the leader of a guerilla unit has the freedom to choose his targets within the 
boundaries drawn by his mission. In unclear situations, he will restrict himself to small actions in 
order to find out how the enemy reacts, and which attitude the population takes. With greater 
knowledge about the enemy and the attitude of the population, he will go on to larger actions. 
These must stay within the boundaries set by his mission, his unit’s strength, the enemy situation 
and the terrain. The golden rule that severe setbacks must avoided in guerrilla warfare must 
never be forgotten. Several successful small actions hurt the enemy more than a half successful 
large operation. An unsuccessful operation often leads to total destruction of the unit; thus, the 
intention connected with its mission would not be fulfilled. 

3. Reconnaissance and Intelligence 

Careful reconnaissance must give the leader of a guerrilla unit the fundamental information he 
needs to make decisions. It may also be of importance for the general planning of the guerrilla 
unit and the regular war command. The general aim of reconnaissance is to determine the enemy 
situation in respect to strength, location of staffs and units, movements, intentions and combat 
strength. Guerrilla warfare targets require careful reconnaissance and observation of the troop 
barracks, officer and functionary quarters, fuel, ammunition and food depots of the enemy his 
security measures and habits, his traffic routes and communication installations. Furthermore, the 
attitude of the population in the operational area and the effect of the guerrilla unit’s activity on 
the enemy and the population is of importance. 


29 



The main effort lies on the detection and reconnaissance of suitable targets and gaps in the 
enemy’s security measures. Immediate guerrilla warfare reconnaissance is conducted by scouts 
and small reconnaissance parties, but most of all by men of confidence and occasional helpers 
out of the population. The results of reconnaissance will be insufficient without the willing and 
understanding help of the population. This help must therefore be sought after. The scout should 
see everything without himself being seen. Besides his special mission, he must always keep the 
security of his unit in mind; he must give warning in due time if danger threatens. If the scout 
cannot avoid combat, he must strive to destroy the enemy quickly. The dead enemy is searched 
for identification papers, letters, notebooks and other sources of information; his corpse is hidden 
to prevent early discovery and pursuit. It is often favorable for scouts to disguise themselves as 
local inhabitants. Greatest caution must be taken when questioning local residents. The important 
questions must be placed unsuspiciously among other unimportant ones. Precautions must also 
be taken when preparing to move on: asking misleading questions about routes and locations that 
the scout never intends to take, turning away from the intended route, and cutting back to deceive 
possible pursuers are all in order here. It is very important that the scout avoids leaving tracks or 
covers those that he has made. He avoids enemy controls by bypassing them on hidden paths. 
Occasionally it is right to boldly mingle in with the traffic on a busy main road. 

Permanent informants and occasional helpers out of the population will often deliver the most 
valuable information because they can constantly observe the enemy activities without difficulty. 
The most important task of the reconnaissance service therefore is to install a network of 
informants. A continuous surveillance must be ensured in the cities, command-centers and traffic 
injunctions. Well suited as informants and occasional helpers are persons that are in contact with 
the occupation forces. This is especially the case if they have access to the camps and barracks 
like innkeepers, door-to-door salesmen, barbers, and personnel from stores delivering goods. It 
will be of greatest value if individual soldiers that are dissatisfied or ideologically close to the 
guerrilla unit or persons attached to the enemy’s army can be won as informants. Untrained 
informants must be given exact instructions as to which information is of value. In order to avoid 
endangering the informant, a “mailbox” is agreed upon. This means that he is ordered to leave 
his observations and information at a certain hiding place. Occasionally an unsuspicious 
rendezvous is arranged with him. This may be in the traffic stream of a busy street on market 
days, in front of food distribution points, stores, and in heavily frequented public offices. Usable 
reconnaissance results are often only obtained after long and patient observation. If other sources 
bring no results, it may become necessary to take a prisoner in order to question him. The best 
time therefore is during a rainy night. 


30 



Usable results are often obtained by listening in on the enemy’s radio communication and 
tapping his telephone wires. See special instructions for this. The reliability of all reconnaissance 
elements and sources must be constantly controlled by comparison and rechecking. Important 
decisions must only be based on information that has been verified through several independent 
sources. After the target has been determined, the information obtained by intelligence must be 
supplemented by a thorough reconnaissance of the terrain around the target. It is very important 
to find concealed routes for the approach and withdrawal. A sketch of the area is of value. Often 
the reconnaissance activity will be determined by orders from the Wehrmacht. 

4. The March 

Guerrilla units almost always march at night. Bad weather must be exploited. They avoid 
dwellings, roads and paths that are often used. When forced to use paths and tracks, greatest 
caution must be exercised; marching at the edge or parallel to the path lessens the danger. The 
march of the guerrilla unit must be a steady cautious advance (Picture 15). 



Picture 15. Noiseless walking 
Left: On soft ground 
Middle: On hard ground 
Right: On grass 


31 



It is best to advance from sector to sector with frequent silent halts in order to listen and observe. 
The march of the guerrilla platoon is secured by advance scouts. Larger units employ an advance 
party and a rear guard. In general, it is not necessary to secure the flanks, spreading out too much 
attracts the attention of the enemy. The advance party must always be intent to avoid terrain that 
makes a silent advance impossible. Before reaching defiles and areas with little cover and 
concealment, scouts are sent out to reconnoiter and secure the march route and the flanks. The 
guerrilla unit waits in combat readiness until they return. These scouts must also advance from 
sector to sector. Communication between the scouts and the unit is achieved with the help of 
unsuspicious signs (animal sounds, visual signs). The meanings of these signs must often be 
changed. Greatest care must be taken to avoid, or respectively, to cover tracks. Where this is not 
possible, the enemy must be deceived with false tracks and by cutting back. It is strictly 
forbidden to smoke during the march. Marches will only be conducted at daytime when it is 
absolutely necessary, in this case, every possibility for cover and concealment must be used in 
order to avoid detection by ground or air surveillance. Long detours are often unavoidable. The 
behavior of domestic animals, wild beasts and birds must be observed because it is often possible 
to draw conclusions as to the presence of humans out of it. If the unit comes upon single local 
inhabitants, they must be taken along under the pretense that they are needed as couriers or 
guides. While they are with the unit, they must be questioned and deceived as to the real 
intentions of the unit through conversation conducted for this purpose between members of the 
unit. Finally, they must be sent off in a misleading direction. Security measures must be taken 
immediately during longer march rest periods. The guerrillas securing the area must be able to 
provide heavy firepower. Before resting, the unit must cut back. The area for the rest must offer 
good cover and concealment as well as fields of fire against any enemy following the tracks of 
the unit (Picture 18). When continuing the march, even after a short rest, a personnel check must 
be made so that nobody is left behind. 



Picture 16. Cutting Back Before Resting 
The rest area is designated by the circle. 


32 





5. Checkpoints for Planning 

Preparatory intelligence and reconnaissance give the leader the information he needs in order to 
plan an operation. When he has reached a decision, he must reconsider the plan of operation he 
intends to conduct and talk it over with his men. Where the possibility is given, he must practice 
important details with them. When planning the following points must be observed: 

a) Place! - Where? Where is the target? Which routes of approach? Which routes for 
withdrawal? Which advantages of the terrain can I exploit? 

b) Time! - When? When is the best time for the operation? At night? During the day? 
During moon-light? During complete darkness? When do the guards change? When is the 
target not secured strongly? 

c) Forces! - Who? Who is guarding/securing the target? Regular army? A special unit? 
Language? How strong? Positions of guards? Attitude of the population living near the 
target? Who will execute the operation? Required strength? Distribution of tasks. 

d) Combat means! - What? What means for destruction are necessary in order to conduct 
the operation? Amount of explosives and incendiaries? Which type of weapons? Which 
type of special clothing? Which equipment? Which helpful aids will I find at the target? 

e) Execution! - How? How will I execute the operation? Combat plan? Demolitions plan? 
Possibilities to infiltrate secretly? Preparation, jump-off position? Deception of the 
enemy? How do I avoid the security elements? How do I avoid or break resistance? 

The key-words, “Where? - When? - Who? - What? - How?” are mainly intended for the 
planning of interdiction operations. Used accordingly, they may also be considered when 
planning other operations. 


6. Interdiction Operations 

In the first phase of guerrilla warfare, interdiction operations are of prime importance. 

The parts of this phase are directed against targets in the enemy’s rear: 

a) Supply of the enemy’s attack spearheads: fuel, ammunition, equipment, maintenance 
services; 

b) Railway installations: rails, railway bridges, train stations, signal boxes, turntables, 
switch points, communication and signal means, repair shops; 

c) Bridges on supply routes; 

d) Transport facilities: trucks, cars, trailers, tractors, locomotives, railway wagons, 
airplanes, horse-drawn carts; 

e) Air traffic: airports, airfields, hangars; 

f) Oil pipelines, fuel dumps, tank trucks, filling stations; 

g) Ammunition dumps, food stores, equipment stores; 

h) Communication installations: Telegraph and telephone lines and transmitting stations, 
broadcasting stations, radio communication installations; 

i) Installations at waterways, floodgates, lifting tackles; 

j) Powerplants, gas and waterworks, dams; 


33 



k) Mines and industrial plants of all sorts. 


They are executed through demolitions, incendiaries, and as a last resort, by other 
mechanical means. Thorough instruction on the means used for destruction is a 
prerequisite to success. Technical instructions therefore must be extracted from 
engineer manuals and special handbooks. The tactical planning and the execution of 
interdiction operations requires caution, cunning and ingenuity. When preparing such 
an operation, the following must he considered: 

a) Which is the most vulnerable part of the target? 

b) Which essential part of the installation can be destroyed, and which means are 
necessary - gunfire, demolition, or incendiaries? Therefore, what is needed and 
what strength is necessary? 

c) At which time of the day should the raid be conducted - daytime, in the night, or 
at dawn? 

d) Which signs will signal the beginning and the end of the attack on the enemy 
installation? 

e) Which routes are best suited for approach and withdrawal? Where is the 
rendezvous point (RV) after the execution of the operation? 

Surprise is the main prerequisite for success. Therefore, absolute secrecy of all 
preparations is necessary. All communication lines leading away from the enemy 
installation are severed when the raid starts. Even in small-scale operations, a 
clear distribution of destruction, security and combat tasks is necessary. A 
security party secures, protects or warns against surprise: a destruction party 
destroys the target. Small units must avoid combat. In large-scale operations a 
reserve is held back in order to break unforeseen resistance and cover the 
withdrawal of the unit after execution of the operation. The reserve should 
primarily be equipped with a sufficient number of automatic weapons. The 
reserve party can cover the withdrawal with gunfire and by laying out mines or 
booby traps. With the latter, it is possible to gain a considerable amount of time. 
In larger scale operations, simultaneous diversionary and feint attacks, ambushes 
along the roads leading to the target, or mining of the routes can occasionally be 
advantageous. When strong enemy firepower can be expected, his possible fire 
plan must be considered during the planning. The instructions under number 9 are 
valid for the withdrawal. 


34 



7. Ambush 


Next to interdiction operations, the ambush is one of the most promising means of waging 
guerrilla warfare. It is successful if the enemy is completely surprised. This can be achieved 
through careful planning and occasionally by skillful and quick improvisation. The smaller the 
operation, the easier its execution and the larger the possibility of avoiding failure. The approach 
to the ambush site must be unnoticed by the enemy and the population. Enemies met by chance 
must be killed inconspicuously. Local inhabitants must be detained for the duration of the 
operation. If necessary, the operation must be cancelled. The ambush must be set up in suitable 
terrain. Areas that are too obvious as ambush sites like defiles, hollows etc. must be avoided. 
Well suited on the other hand are inconspicuous positions in hedges, forest edges, cornfields, 
settlements and gardens, especially if they offer possibilities of covered and concealed 
withdrawal. Patient, noiseless, and motionless waiting, often over a longer period of time, are 
necessary when laying in ambush. Fire only opens up when the order or predetermined sign is 
given. In larger scale ambushes the advance party of the enemy should be allowed to pass in 
order to hit the more valuable targets following. If sufficient forces are available, a separate 
ambush may be set up for the expected advance party. Fire on the advance party may open up 
only after the main ambush is sprung. In smaller operations, only weaker enemy units, that can 
be completely destroyed, are ambushed. The most effective arms in ambushes are automatic 
weapons. Their effect is greatly multiplied if mortars etc. can also be employed. Where it is 
possible, the ambush should be combined with minefields. The pictures 17, 18 and 19 give a 
guideline as to how ambushes may be set up. 


Ambushes are set up 

a) at roads 

b) at railways 

Hereby the following peculiarities must be observed. 

a) In ambushes at streets, it must always be considered that the enemy will secure his 
march routes and watch over them, with patrols, security elements, reconnaissance 
parties and airplanes. 

The ambush must therefore be camouflaged so well that enemy security elements and stronger 
enemy units that are allowed to pass do not notice it. Reconnaissance must be continued during a 
larger operation in order to make an unexpected enemy attack impossible. The tasks of security 
and reconnaissance elements, on one side, and combat and reserve elements, on the other, must 
be closely and carefully defined. 


35 



Picture 17. Road Ambush of a Guerrilla Group 

These guerrillas open up fire from the flanks. A machine gun or two guerrillas then fire on and along the road and 

especially into the road-ditches. 


36 





When ambushing motorized march columns, the front of the column must be forced to stop. This 
is done by using barriers. Only then is fire opened up on the vehicles. 



It is very advantageous if a small guerrilla unit can execute ambushes at various roads in short 
order. The enemy is thus deceived into thinking that the area is infested with guerrilla units. This 
forces the enemy to employ intensive security measures and ties up a larger number of his 
troops. When this has been achieved, the main effort of the guerrilla unit is shifted to other 
operations. 

b) In ambushes it railways, the aim is to completely destroy as much material and enemy 
personnel as possible. Ambushes at railways are the task of larger guerrilla units, platoons or 
corps. Smaller units may conduct demolition of rails and harassment by occasional gunfire. 

Ambushes at downhill sections of the railway, and if possible, at a curve in connection with 
mines, are potentially worthwhile. 


37 



Obstructions of longer durations are thus achieved; also, the curve can be covered more easily by 
gunfire. 



Picture 19. Railway Ambush of a Guerrilla Platoon 

The ambush site should be away from fortifications, rail-way stations, and junctions as far as 
possible in order to avoid quick intervention by enemy security forces. Communication wires 
must also be cut. Before the operation, intelligence and reconnaissance must concentrate on 
observing traffic density protective measures, and who occupies the trains. During the operation, 
every guerrilla group and every single guerrilla must know exactly which task they have been 
given. After successful demolitions, the main impact of the gunfire must be directed against the 
cars that are damaged least. Soldiers jumping out of the train must be taken with fire from the 
flanks. Possible cover near the train must be controlled by gunfire. In most cases a sign for the 
opening of fire is not necessary. It is opened up with the explosion of the mines and the derailing 
of the train. 


38 




It is very important that a sign for cease-fire be predetermined in order to avoid endangering the 
guerrilla groups that have been assigned the task of destroying the remains of the train and 
salvaging the usable booty (weapons, ammunition, food, medicine, clothing). 

8. Raids 

By fully exploiting the surprise element of a raid, it is possible to destroy an enemy that is 
superior in numbers or weapons. But if the raid is unsuccessful, the operation often ends with 
high losses. If the enemy has a great numerical superiority and fights with tactical skill, this can 
lead to the destruction of the guerrilla unit. Therefore, the decision to raid a superior or stronger 
enemy, for example, a strongpoint, an enemy-occupied village, a staff, an airport, a camp, a 
railway station, should be considered very thoroughly. All circumstances must be checked. 
Reliable and secure routes of withdrawal in case of failure are a prerequisite. Only a leader with 
very good tactical training will be able to plan and conduct a raid or a well-defended larger 
target. Improvised raids at each possible opportunity are far more promising and much easier 
than attacks against such difficult targets. Even smaller guerrilla units can achieve good results. 
Such possibilities are given by chance when coming upon stragglers, wood collection parties, 
messengers, lone vehicles, staff on reconnaissance. They may also be sought or created: for 
example, by guerrillas hiding on a train and attacking the personnel on the locomotive. Or by 
burglarizing the apartment of a functionary and killing him, or attacking enemy duty offices, 
powerplants, out-posts that are insufficiently secured. Skillful exploitation of such possibilities is 
the nature of guerrilla warfare. They offer good chances of success at little risk. 

The raid of a larger target that is easy to defend and well secured, for example, an enemy- 
occupied dwelling, requires careful planning. Sufficient forces must also be available. This is 
only possible for larger guerrilla units. The aim is the destruction of the important enemy 
installations that are set up there, i.e. powerplants, fuel dumps, staffs etc. Thorough 
reconnaissance and intelligence must be conducted before planning. Strength, order of battle, 
armament and deployment of the enemy, his security and defense instructions, defensive 
installations, barriers, communication lines to neighboring villages, immediate security at the 
operation target, must be established in advance. In order to achieve a certain familiarity with the 
habits of the enemy, intelligence and reconnaissance must be conducted over a longer period of 
time. The help of the inhabitants is absolutely necessary. The combat plan is made according to 
the results of the intelligence and reconnaissance. It must primarily contain: 

a) Disposition of forces, combat means and equipment; 

b) Order of battle, allocation of security, relief assault and destroy groups; 

c) Assignment of the attack and destroy targets; instructions to the security and relief 
groups; 

d) Support on the part of the inhabitants or through guerrillas that have infiltrated; 

e) March and approach 

f) Time of attack (if necessary, attack signal) watch word, recognition signals 

g) Orders for withdrawal, immediate, secondary rendezvous points 

h) Place of the leader during the attack 


39 



The raid must start by surprise. The operation must be called off if the element of surprise 
is lost before the attack. The execution of a raid requires ruthless daring, energetic 
momentum and flexible improvising. Unexpected enemy defense must be broken. 
Surprise over the defenders must always be taken into consideration when raiding large 
objects, even after very thorough reconnaissance. The first, most important aim is the 
simultaneous destruction of all securing elements if this is possible. This is best achieved 
through guerrillas that have infiltrated into the village before the raid and attack the 
sentries or guards at a predetermined time or signal. At the same time all communication 
wires leading from the village are cut. The second aim is to seize the most important key 
positions before the alarmed defenders can man them and at the same time attack the 
barracks, where the soldiers must be killed or contained. The most important rules of 
street combat must be observed: containing enemy resistance pockets through automatic 
weapons and mortars; avoiding open places and the middle of the street, using all 
possible cover that doors, comers, columns etc. offer: smoking out houses that are 
stubbornly defended with hand grenades, if necessary, by demolitions or by burning them 
out. Only after successful paralyzation of the defenders can the planned destmction be 
executed. 


40 



Unexpected disturbances must be quieted by the relief groups held in readiness. Unceasing 
reconnaissance during the execution of the raid must not be neglected. Elements must secure 
against neighboring villages. Streets, on which enemy reinforcements may arrive, must be sealed 
with barriers. After execution of the operational aims on which the raid was based, the groups 
withdraw in predetermined order after the signal to do so has been given. The relief groups that 
were held in readiness cover the withdrawal and disengagement from the enemy. Raids against 
weaker objects, train stations, depots and supply and industrial installations outside of enemy 
guarded settlements can be conducted by small guerrilla units. These must be planned according 
to the same basic tactical rules that are valid for operations against strongly secured settlements. 
They promise easier success. 


8. Disengagement 


Skillful disengagements from the enemy and withdrawal after the execution of an operation, or 
when breaking off of an operation, is a tactical component of guerrilla warfare. Successful 
withdrawal secures the possibility of landing new surprising blows against the enemy. 
Withdrawal is easiest if it is possible to completely destroy the enemy. This must be considered 
when choosing a target. Operations in which the guerrilla unit could be engaged in a long-lasting 
fight with superior enemy forces must be avoided. They do not fit in with the character of 
guerrilla warfare because they make withdrawal extremely difficult. Concealed routes of 
withdrawal must always be reconnoitered even if complete success can be expected. Orders for 
the withdrawal along these routes must be given in advance. The withdrawal from the enemy is 
conducted individually or in small groups. Rendezvous points and waiting times must always be 
ordered beforehand. In most cases, it is appropriate to determine an immediate RV (1-3 
kilometers) with a short waiting time (1-3 hours) and a secondary RV with a longer waiting time 
(about 24 hours). The RV points should offer good cover and concealment, close observation 
posts, and concealed routes of withdrawal, ft is absolutely necessary to secure the RV. The 
possibility that the enemy may find the RV by treason must always be considered. The rest area 
of the unit must therefore be away from the RV point. Only a guide remains at the RV. Groups 
must always be ordered to cover the withdrawal of the guerrilla unit with gunfire and barriers if 
the operation is conducted by a larger guerrilla unit. 


40 




Picture 20. Backtracking and Jumping Off the Track 
The guerrilla first went to the forest edge where he backtracked and jumped off his tracks into a group of bushes. 
He waded through a creek in order to further conceal his tracks. 


41 



It is best to give this task to the relief groups held in readiness. Pursuit from skillful scouts, 
tracking dogs, and trackers must always be expected. All possibilities to deceive them and 
conceal one's own tracks must be used. Such possibilities are: backtracking, cutting back, 
jumping off the track at suitable places, wading through streams. Setting up ambushes along the 
route of withdrawal now and then after a successful operation can lead to new success and make 
further withdrawal easier. 


10. Securing the Rest Area 

Permanent camps can only be set up in very favorable terrain such as widespread forests, 
moorlands and mountains. Care must be taken to camouflage the camp and the trails leading to it 
very well. A sure and safe measure is to only walk on hard, rocky underground. It must be 
avoided that beaten trails come into being. Care must be taken to secure the encamped guerrilla 
unit even where permanent camps cannot be erected. An effective security measure is to change 
the hideouts, which can be in isolated farms, cellars, ruins, hunting cabins, bams, dense pine 
groves, as often as possible. Immediate security is ensured by listening and observation posts. 
These are supplemented by a constant reconnaissance of the surrounding area. The best security 
is achieved with the help of the populator. Women and children may be of useful service. Certain 
unsuspicious signals for warning and alarming the guerrilla unit must be ordered in advance. The 
same holds tme for changing codewords and identification signals. Hideouts should have an 
emergency exit. Good protection can be achieved where it is possible to mine the approaches or 
set up booby traps using hand grenades with trip wires. Each guerrilla must always have his 
weapon within reach even when resting. 


42 



11. Protection Against Countermeasures 

The following countermeasures may be expected from the enemy: 

a) Use of informants and provocateurs. 

b) Employment of special hunter forces. 

c) Encirclement and search of the operational area, 

d) Securing and guarding of all war-vital installations. 

a) The use of informants and provocateurs forces the guerrilla unit to reinforce their 
observation teams and use special precautions when contracting civilians. Men of 
confidence and sympathizers must be ordered to observe the enemy agency that recruits 
and employs the informants against guerrilla units. Informants that have been uncovered 
must be destroyed. 

b) The employment of special hunter forces by the enemy is a considerable problem for 
guerrilla fighters. It is the mission of these hunter forces to detect, pursue and fight the 
guerrilla units with the same means and methods - cunning, camouflage, surprise - that 
the guerrillas use. Because of this, the enemy hunter forces, which consist of specially 
picked men, are particularly dangerous. Only untiring watchfulness and never lessening 
caution can protect against surprise attacks from enemy hunter forces. 

It may become necessary to concentrate the complete guerrilla war effort in an 
operational area on destroying an especially dangerous enemy hunter force. 

c) Encirclement and search of the operational area requires a large number of troops. If the 
enemy sees himself forced to employ such measures that tie down a large number of his 
forces, this is already a success. Such large-scale operations must be feared less than the 
employment of hunter forces because there always are sure possibilities to evade: 

aa) Withdraw from the operational area when the enemy intention of encirclement has 
been detected; 

bb) Exfdtrate through enemy lines where they are very thin at the beginning of the 
encirclement in favorable terrain; 

cc) Stay behind the lines in well-camouflaged foxholes or similar hideouts; 
dd) Break out of the encirclement at a weak point in the line. 

d) The securing a guarding of the land and of all-important installations by the enemy makes 
careful reconnaissance and planning for guerrilla actions but does not make the actions 
impossible. There is no countermeasure of the enemy that cannot be rendered useless 
through skillful adaption to it. The attitude of the population and the amount of assistance 
it is willing to give to the guerrilla unit is of great importance. 


43 



V. Action Against Enemy Agitation 

Because of the close relationship of guerrilla warfare and politics, action against enemy agitation 
is a task that is just as important as interdiction and combat actions. All means must be used to 
ward off enemy influence and waken and maintain a clear political will. Tactical activities must 
always take consideration of this necessity. It is essential for the guerrilla unit to have constant 
news of the general situation. 

The intellectual-political instruction is intended for: 

a) the guerrilla units 

b) the population 

c) the enemy 

a) Because of their strenuous combat activity, the guerrilla units themselves need special 
intellectual-political care and leadership. Guerrilla warfare is not possible without a 
clear political will. The guerrilla not only submits to extreme hardships and constant 
danger, but also to the intellectual influences that are predominant in the rear area of 
the enemy. His political will must be strengthened and hardened against these 
wearing influences, and his spirit challenged to constant watchfulness. The most 
effective means of intellectual-political instruction for the guerrilla unit is the 
example of their leader. If he is filled with a glowing love for the fatherland, prepared 
to make any sacrifice for the freedom of his peoples and willing to bear any hardship, 
then his guerrillas will also. Warding off enemy agitation is an easy task then. The 
guerrilla must be enabled to express his political belief clearly and convincingly 
through the intellectual training. He must be able to argue the cause of his fatherland, 
of truthfulness and justness with wit. 


44 



b) The population in the operational area sees the guerrilla as a representative of the nationhood 
from which they have been cut off. His attitude, his confidence and unyielding will to fight must 
be a stimulus to all those with a positive attitude. The leader in charge of political questions has 
the important duty of establishing and maintaining contact with the population. This must be 
done under consideration of all precautions. He must find out their sufferings, worries, and 
opinions, and observe all measures of the enemy command and administration attentively. Every 
possibility must be used to unmask enemy agitation and lies, to supply the population with true 
news, reminding them of the eternal values of nationhood, and root out cowardly servility. All 
means to reliably spread news is good. Often the simplest is the most effective (mouth-to-mouth, 
chain and ring letters, inscriptions with chalk, paint, and stamps on walls, enemy billboards and 
proclamations, pamphlets from hand to hand). It may become necessary for larger units to 
acquire a duplicating machine or a printing press, and also material needed to make simple 
stamps. The achievements of the guerrilla unit must be made public without restraint. Friend and 
foe should talk of them. It is no disadvantage if the unit is credited with deeds and capabilities 
that exceed its potential. It is wise to show restraint when requisitioning and demanding support 
from the population. All unnecessary inconveniences and danger to the population should be 
avoided. The guerrilla unit must try to help and protect as far as this is possible within their 
mission. Traitors must be rooted out without pity. 

c) If it is possible to point out the true situation and the unavoidable results of the enemy’s 
policy, in addition to the initial mission, then this should be done. Suited here are pamphlets, 
handbills, and inscriptions on walls. It can also be of use to let a prisoner free if he spontaneously 
shows signs of individual and political insight. The political leader of the unit must have the 
opportunity to instruct and influence him before this is done. Caution must be exercised. The 
tactical mission and the security of the unit have priority. 


45 



VI. Accommodation and Food Supply 

1. Shelters 

Permanent camps with bunkers, log cabins, permanent tents or light emergency shelters 
may be built if the general situation permits it, and the terrain offers sufficient cover and 
concealment. Such camps offer the advantage of a certain level of comfort. Their 
detection by the enemy, on the other hand, cannot be avoided, even with very good 
camouflage, because of the beaten trails that have come into existence. 



Picture 21a. Earth bunker (cutaway) 


Temporary protection is achieved by choosing the construction site in unpassable terrain, 
far off from the settlements, in dense undergrowth. 

a) Bunkers and log cabins are built with simple means that are adapted to the available 
material and the skill of the constructors. Fanciness must be avoided. 


46 



Adaptation to the surrounding terrain through camouflage and avoiding beaten tracks are the best 
protection for a bunker (Picture 21). 



Picture 21b. Earth bunker (Layout) 

Construction of bunkers or huts can become absolute necessity during long missions in winter 
and in some areas work must start in due time in autumn. 

b) Tents and emergency shelters are sufficient in summer. By using some poles and braces, 
larger tents in square or circular form can be easily built. They offer the advantage of a certain 
living comfort. The principles of careful camouflage and adaption to the surrounding terrain are 
also valid for tents. Twig huts or twig walls combined with canvas roofs comply with the 
principles of camouflage very well. 


47 




They are set up very easily and quickly. In addition, more space is achieved with the same 
number of tent canvas pieces. Twig huts may be built in umbrella, half-tent, or house form. 
Guidelines here are given in the pictures 22 and 23. 



Picture 23. Round Twig Hut 

1. Lashing 4. Fireplace 

2. Flue 5. Air inlet 

3. Twigs 6. Sleeping place 


Spruce and pine branches are fastened to spars with wire, string, or flexible twigs. Their needles 
must hang downwards in order to drain off rain. They must be packed one upon the other from 
bottom to top. A clean and accurate packing of pine twigs also makes a good sleeping place. 




Picture 22 and 24. Twig Hut and Twig Roof 

It cushions and protects against cold and moisture from the ground. Twig huts may be built 
halfway into the ground. They can then he camouflaged more easily and are much warmer. The 
dug-up ground must be carefully hidden, it is advantageous to cover the roof with a layer of earth 
or snow and maybe some leaves as camouflage. Permanent shelters cannot be erected where the 
terrain does not offer adequate cover and concealment. In this case, suitable emergency hideouts 
like lone farms, animal sheds, bams, hay lofts and mins must be chosen. With some skill, it will 
he possible to arrange warm pieces in them, even during winter. 



2. Heating and Cooking Fires 

It is necessary for the guerrilla to build fires as a source of warmth and to cook. Matches must 
always be protected against moisture and used very sparingly. It is a good idea to keep a small 
emergency supply in a waterproof separate container (bullet casing closed with wax). Moist 
matches will light more easily if they are rubbed in the hair before striking them. If matches are 
missing, it is possible to shoot fire in the following way: remove the bullet, pour most of the 
powder on a piece of paper or bark; add paper wads, dry grass or similar material; stick a soft 
loose paper plug in the shell, fire at the prepared ignition material, and blow softly. “Shooting” a 
fire is not very easy in humid air. It works better if a teaspoon of the filling from a flare is added 
to the paper. In strong sunlight, the fire material that was prepared can be ignited with the help of 
a lens. After ignition, the fire is nourished further by small sticks with shavings (Picture 25), dry 
pine twigs and dry grass. 



50 



Campfires are only allowed if the enemy situation permits it. The most advantageous types are 

shown in picture 26. 



Picture 26b. Log-Fire and Invisible Fire 

Care must be taken to always avoid treacherous smoke and glow from a fire. It is best to cook at 
night. If it is possible to build a stove, the smoke must be conducted in such a way, that it 
disperses between the trees. 

3. Water 

Surface water out of streams of all kinds should always be boiled before use. Water purification 
tablets may replace this measure in emergencies. 

4. Latrine and Waste 

Where it is not possible to use an existing latrine, it must be avoided that latrines are set up near 
the camp so that the enemy’s attention is not drawn to the site. The same applies to urinating and 

dumping of waste near camp. 

5. Food Supply, Subsistence 

Where the guerrilla units must live off the land, they must requisition their food from villages 
that are far away from the camp. 


51 



Staple rations must always be saved. More insufficiencies do not allow for them to be touched. 
They may only be used when under enemy pressure or when all other possibilities to acquisition 
food are blocked. Concentrated food that is supplied by air must be used very sparingly. The 
mess sergeant must know which amount of food is needed by the unit. He must then determine 
type, amount and work out a plan - the acquisition debit - to get it. He is responsible for the 
execution of the acquisition. 



Picture 27. Foxhole for Wounded 

Bread or flour, groats, vegetables or white cabbages, fat and meat and salt are mainly needed. 
Ready-made grots may be replaced by barley, wheat, rye or oats in emergencies. 


52 



Calculating an amount of 2-3-kilograms raw weight of food per man and day adds up to about 50 
kilos for a 20-man unit. That is about 300 to 400 kilos per weeks, which is the equivalent of one 
or two horse drawn carts. The acquisition plan must be based on such calculations. No more than 
one week’s supply should be kept openly in permanent camp. 



Picture 26. Sledge for Wounded 

Staple supplies of long-lasting food (bacon, smoked meat, groats, salt, honey etc.), if possible to 
last for one month, should be scattered throughout the operational area. Care must be taken that it 
is stored in such a way that it is safe from wild animals and rats. The food that is constantly 
needed is stored in well-camouflaged foxholes near the accommodation. It should be sufficient 
for about one month. Potatoes can be kept in holes and covered. Wheat, groats and so forth are 
best buried in wooden barrels or boxes and sealed from the top with a water-proof wooden lid 
and a thin layer of clay etc. and then camouflaged. 



Vegetables may be buried in the same way as potatoes. Cabbage is best kept in wooden barrels: 
bacon may be kept along with wheat. Fat and butter should be well salted and poured into small 
wooden kegs. The opening is sealed by nailing a lid on. The kegs are buried or hung in the trees 
in dense pine groves. In summer, meat will only keep if it is heavily salted and, if possible, 
smoked. In winter, meat will keep almost indefinitely if it is frozen. Tea can be made out of lime 
blossoms, blackberry leaves, young leaves of wild strawberries and others. Roasted acorns, 
barley, wheat and so on may serve as coffee substitutes. 


5. Emergency Rations 

Wooden flour is a good emergency ration. It is best acquired from young pine or birch trees in 
the following way: remove the outer rough bark; separate the soft, moist layer underneath and 
cut it into small pieces; changing the water several times, cook it until the resin taste is lessened; 
carefully dry the pieces until they are dry and brittle; grind down and pulverize them into flour. 
The yellow-brown wooden flour that has been obtained in this way can be used to extend wheat 
or rye flour. It may also be eaten pure. To do this, prepare a dough using milk or water, roll it out 
very flat, cut it into pieces and roast these on tin or iron pans. Very young spruce sprouts can be 
eaten raw or cooked. Edible mushrooms are good food, berries also. Mushrooms become 
poisonous after a frost, whereas many berries, like mountain ash and barberries, only become 
edible and tasty after they have been frozen. Cranberries, whortleberries, elderberries, and 
hawthorn, which are found in moorlands, are very nutritious and tasty. Lime buds and most moss 
(with the exception of the yellowish ones), especially the greyish white well-known reindeer 
moss, are edible. The bitter taste that is inherent in them can be removed by soaking them for 
several hours in water to which wood ash has been added. After that you can cook them into a 
mash that is fairly tasty. In emergencies, you can eat moss raw after washing it thoroughly. At 
the banks of rivers and lakes you can dig out the thick roots of calamus reeds. They can be eaten 
raw, cooked or baked. 


54 



Appendix I 

Guideline for the Equipment of the Guerrilla 

Each guerrilla seeds: 

Rucksack or pack 
Haversack or hunting pouch 
Canvas piece 
Blanket or sleeping bag 
Webbing or belt 
Ammunition pouch 
Mess kit 

Canteen with cup 
Cutlery 

Hunting knife or dagger 
Compass 

Lighter, matches, magnifying lens, firestone 
Weapons cleaning kit 
Pencil and paper 

Calendar with rising and setting times of sun and moon 
Camouflage net 
Mosquito net 
First-aid equipment: 

Small first-aid kit with basic first-aid instructions 
Dressing (in the uniform) 

Chinin 

Aspirin Tannalbin Vitamin drops 

Prontosil Pervitin Water purification tablets 


55 



Each group needs: 

Binoculars 

Flashlights 

Map case and maps 

Shovel 

Claw axe 

Saw 

Isolated pliers and wire cutters 
Collapsible stoves for solid fuel 
Whistle 


56 



Appendix II 

Instructions for the Use of the March Compass 

1. March Compass and Map 

First line up the orienting arrow with the “N” and the index mark. Then lay the compass 
on the map (on maps with grid lines parallel to the north-south line) so that the index 
mark points to the upper edge of the map (north). Now the map with the compass is 
turned till the magnetic needle is in line with the orienting arrow. The declination 
(difference between magnetic and geographic north) does not have to be considered. Now 
the map is oriented (north). Facing in this direction, south is behind you, east is to the 
right, west to the left. After having determined your position by comparing the map with 
the surrounding terrain, all points away from this position are in the same direction as on 
the map. 

2. Determining a Bearing 

a) Determining a bearing with the help of a map and compass, 
aa) Connect the departure point with the destination point. 

bb) Lay the ruler edge of the compass along this line so that the arrow points to the 
destination point. 

cc) 1. On maps with grid lines, rotate the turntable of the compass so that it is parallel 
with the nearest North-South grid line. 

2. On maps without grid lines, it is sufficient to bring the East-West line on the 
turntable parallel to the names of the dwellings on the map. Memorize the number that 
the index mark points to. You now have your bearing. When using the compass in the 
terrain you must align with the magnetic needle with the arrow “N.” 

b) If the destination point is visible from the departure point, then you must: 

aa) Sight the destination points over back - and fore-sight with the mirror up. 

bb) Turn the turntable so that the magnetic needle points to the declination mark 
(which you can now see in the mirror). The index mark now points to the bearing. 

c) Marching by bearing. 

Turn the turntable so that the index mark points to the number of the bearing. Now turn the 
compass so that the magnetic needle points to the declination mark. The march route and 
destination point are along the extension of the index mark. 


57 



Appendix III 
Airborne Operations 
1. General 

Insertion and resupply by air is conducted by parachute drop or by air landing with 
motor-planes or gliders. Both types of operations need to be prepared by experts. 
Everyone who has to consider the possibility of air insertion or resupply must know the 
following basic principles. The airborne operation is dependent upon the weather, 
especially in respect to visibility at the drop zone or landing site, motor failures and other 
circumstances. Therefore, it cannot be planned very far in advance as to a certain time. In 
resupply operations that serve an existing ground organization in the operational area, a 
possible operations period of at least 8 days must be agreed upon. The path-finder group 
responsible for the landing light signals or beacons must be ready during this period of 
time. The time of arrival may be later in case of enemy contact or unfavorable weather, or 
earlier in case of strong tail wind. 

2. Parachute Drop 

The static-line parachute is used when dropping persons. The parachute opens 
automatically. The chute is absolutely safe if maintained properly, and there is no danger 
to life even with inexperienced men. The impact on the ground at a rate of descent of 
about 6 meters/second, is no greater than when jumping from a height of 2 meters. It is 
essential that the chutist keeps his feet together so that the impact is absorbed by both 
feet. Special gymnastics are not necessary. Cargo drops are conducted using special 
weapons, and equipment containers and automatic parachutes. Cargo may be dropping by 
itself or combined with personnel. The parachutist can carry only that equipment with 
him that he urgently needs, such as rations, weapons (pistol, hand grenades), and other 
material needed for the mission. This can be done by carrying the equipment on the man, 
in the pockets, in a pack tied in front of the chest, or in a bag. Untrained men are easily 
hurt when carrying rifles or submachine guns during the jump. This is especially the case 
at night. This equipment should be attached to the webbing and lowered by a rope so that 
it hangs underneath. All other material should be dispatched separately. Cargo-load drops 
are subject to technical considerations. They are conducted under the supervision of 
experienced specialists. Of course, every member of the guerrilla unit going into action 
must know the contents of each load. The loads should be plainly marked with luminous 
paint. The flight route must be clearly visible. This is achieved by using dominant 
navigation points like bays, rivers, railways, streets, that are easily seen. Larger 
settlements should be avoided. Mountains generally are not suited as navigation points. 
Insertion is mainly conducted at night. The navigation points are recognized best between 
the 8 th day before and after full moon. 

The drop zone should be sparsely populated and easily accessible to the flight’s position- 
finding means. A large dispersion of men and material must be considered when 


58 



choosing the drop zone. Large pastures that are fenced in by forests or hills, and cannot 
be viewed from the sides, are best suited. 


59 



They should not have ditches, boulders or other natural or artificial obstructions on them. The 
size should be approximately 2000 by 500 meters. Dispatching is conducted according to the 
technical and tactical instructions of an experienced jump-master. The best flight level is at 300 
meters. In order to ensure a dense landing when dispatching whole units, it is necessary that the 
men jump in close and fast sequence (each 14 second). Delays during the dispatch may endanger 
the complete mission. When having to approach repeatedly there is no guarantee that the unit 
will land close together. If the unit was dropped into an area that was not foreseen for it, due to 
incorrect navigation or an emergency, it still must be able to operate from there and reach the 
operational area. Appropriate supplies with maps and march compass must be provided. When 
planning the mission, it must also be considered that radio communications may not work, 
(Determination of land messenger routes, or mail deposit sites, link-up with existing radio 
installations in the operational area.) A drop zone with the same characteristics as for paratrooper 
landing zones is agreed upon for resupply operations. The procedure for the assembly of the 
groups after landing must be ordered in detail. First contact is made using inconspicuous sound 
signals (animal voices, clapping hands). Depending on the situation, the group gathers from the 
first to the last or vice-versa. If cargo has been dispatched before the men, the group gathers 
towards the first man. An alternate assembly point or RV must be ordered in all situations so that 
men who have been carried away from the drop zone can join their group later on. In order to 
assist the airplane in finding the drop zone, the unit already in the operational are uses directions, 
finding equipment or sets up visual signs that were agreed upon. These signs must consist of a 
simple, clearly visible geometrical symbol that rules out any confusion. (Example: an isosceles 
triangle with a base of 70 meters and two sides of 100 meters.) While sheets are laid out in 
daytime at the comer points. At night, fires are lighted that are prepared by heaping up wood. 
Incendiaries should be used to light them quickly. They are lighted as soon as the listening post 
hears the first motor noises. It must be possible to keep the fire burning for a longer period. As 
soon as the airplane has reached the drop zone, a flashing light should be shined. Flares may only 
be used if the enemy cannot see them. 

3. Air Landings 

Air landings are dependent upon a number of very different and variable conditions from case to 
case. There will always be the exception. Landings of airplanes are only to be planned if 
preparations are possible by an organization already in the operational area in genera., an expert 
may be dropped in to check the suitability of the site for landing and starting. Where this is not 
possible, the following guidelines must be used: A motor vehicle should be able drive over the 
field at a speed of approximately 60 kilometers/hour. The landing site should be completely flat 
without natural or artificial obstacles. It should not be too soft. Also, the immediate surrounding 
terrain should not have any high obstacles in order to ensure low entry and exit. The landing site 
is marked with lights or white sheets according to the agreed sign. In general, a site of 2000 x 
2000 meters will be required. The same rules as for airplanes also apply to gliders. But the 
distance needed for landing may be reduced to approximately 30 meters through the use of 
braking parachutes or rockets. Night landings without preparation by an existing organization are 
not possible, even for gliders. In general, the insertion will be in the early hours of dawn. But 
even then considerable casualties must be expected in case of ground fog. The execution of a 


59 



glider insertion is extremely dependent upon the careful choice of the glider pilot. He must stay 
with the guerrilla unit after the landing and should be used as an expert on all questions 
concerning air operations. 


60 



Appendix A: Digital and Modern Methods 


1. Operational Security (OPSEC) 

Introduction to OPSEC: A Caution Against Paranoia 

The following summary of the modem state of the surveillance network is provided to make the 
reader aware of one thing: 

PERFECT OPSEC IS AN ILLUSION. THE ONLY PATH TO VICTORY IS THROUGH 
DETERMINED ACTION AND MILITARY PROWESS. It is highly encouraged to assign 
certain people within your combat unit the role of maintaining OPSEC/INFOSEC and 
developing this understanding among the rest, not through constant discussion, but through 
timely updates, should their behaviors deviate from agreed upon procedures. Ultimately, the 
modem revolutionary must be agile and aware, this Appendix is a collection of modem tools to 
supplement a strident behavioral style. A sufficient degree of OPSEC to provide reassurance and 
guide actions is to be weighed against paranoia and inaction. Ultimately, it is preferential to 
discount OPSEC in favor of revolutionary action and a coherent understanding of National 
Socialist principles, especially as they apply to continuous improvement. In practice this 
means: „Keep Calm and Carry On “! 


I. TOR 

As a very long time Tor user, the most surprising part of the NSA documents was how 
little progress they have made against Tor. Despite its known weaknesses, it's still the 
best thing we have, provided it's used properly, and you make no mistakes. If seeking 
security of "the greatest degree technically feasible" such as when facing ZOG or an 
enemy well-funded government with significant visibility or control of the Internet you 
must take into consideration the warnings that Tor is not sufficient to protect you from 
such an actor. Consider whether you truly need this level of protection. If having your 
activity discovered does not put your life or liberty at risk, then you probably do not need 
to go to all of this trouble. But if it does, then you absolutely must be vigilant if you wish 
to remain alive and free. 

Contents 

1) Your Computer 

2) Your Environment 

3) Your Mindset 

4) Hidden Services 

5) Conclusion 

6) Source 



1) Your Computer2 

To date, the NSA and FBI's primary attacks on Tor users have been Man-in-the Middle 
(MITM) attacks (NSA) and hidden service web server compromises (FBI) which either 
sent tracking data to the Tor user's computer, compromised it, or both. Thus, you need a 
reasonably secure system from which you can use Tor and reduce your risk of being 
tracked or compromised. 

1) Don't use Windows. Just don't. This also means don't use the Tor Browser Bundle on 
Windows. Vulnerabilities in the software in Tor browser button figure prominently in 
both the NSA slides and FBI's recent takedown of Freedom Hosting. 

2) If you can't construct your own workstation capable of running Linux and carefully 
configured to run the latest available versions of Tor, a proxy such as Privoxy, and a web 
browser (with all outgoing Cleamet access firewalled), consider using Tails or Whonix 
instead, where most of this work is done for you. It's absolutely critical that outgoing 
access be firewalled, so that third party applications cannot accidentally leak data about 
your location. 

3) If you are using persistent storage of any kind, ensure that it is encrypted. Current 
versions of LUKS are reasonably safe, and major Linux distributions will offer to set it 
up for you during their installation. True Crypt 

2 Note: Burner phones, Signal Jammers and EM weapons are not discussed however are 
recommended for further personal study. Burner phones (both old and new) especially 
present an attractive option for revolutionaries with access to expansive financial options 
and are ideal for communications. Might be safe, though it's not nearly as well-integrated 
into the OS. BitLocker might be safe as well, though you still shouldn't be running 
Windows. Even if you are in a country where rubber hosing is legal, such as the UK, 
encrypting your data protects you from a variety of other threats. 

4) Remember that your computer must be kept up to date. Whether you use Tails or 
build your own workstation from scratch or with Whonix, update frequently to ensure 
you are protected from the latest security vulnerabilities. 

Ideally, you should update each time you begin a session, or at least daily. Tails will 
notify you at startup if an update is available. 

5) Be very reluctant to compromise on JavaScript, Flash and Java. Disable them all by 
default. If a site requires any of these, visit somewhere else. Enable scripting only as a 
last resort, only temporarily, and only to the minimum extent necessary to gain 
functionality of a web site that you have no alternative for. 

6) Viciously drop cookies and local data that sites send you. Neither the Tor browser 
button nor Tails do this well enough for my tastes; consider using an addon such as Self- 
Destructing Cookies to keep your cookies to a minimum (0). 

7) Your workstation should be a laptop; it must be portable enough to be carried with 
you and quickly disposed of or destroyed. 

8) Don't use Google to search the Internet. A good alternative is Startpage; this is the 
default search engine for Tor browser button, Tails, and Whonix. Another is 
DuckDuckGo which also has a hidden service. Plus, it won't call you malicious or ask 



you to fill out CAPTCHAs. 

2) Your Environment 

Tor contains weaknesses which can only be mitigated through actions in the physical 
world. An attacker who can view both your local Internet connection, and the connection 
of the site you are visiting, can use statistical analysis to correlate them. 

1) Never use Tor from home, or near home. Never work on anything sensitive enough to 
require Tor from home, even if you remain offline. Computers have a funny habit of 
liking to be connected. This also applies to anywhere you are staying temporarily, such as 
a hotel. Never performing these activities at home helps to ensure that they cannot be tied 
to those locations. (Note that this applies to people facing advanced persistent threats. 
Running Tor from home is reasonable and useful for others, especially people who aren't 
doing anything themselves but wish to help by running an exit node, relay, or bridge. 

2) Limit the amount of time you spend using Tor at any single location. While these 
correlation attacks do take some time, they can in theory be completed in as little as a 
day. And while the enemy are very unlikely to show up the same day you fire up Tor at 
Starbucks, they might show up the next day. I recommend for the truly concerned to 
never use Tor more than 24 hours at any single physical location; after that, consider it 
burned and go elsewhere. This will help you even if the enemy show up six months later; 
it's much easier to remember a regular customer than someone who showed up one day 
and never came back. This does mean you will have to travel farther afield, especially if 
you don't live in a large city, but it will help to preserve your ability to travel freely. 

3) When you go out to perform these activities, leave your cell phone 
turned on and at home. 

3) Your Mindset 

Many Tor users get caught because they made a mistake, such as posting their real E-mail 
address in association with their activities. You must avoid this as much as possible, and 
the only way to do so is with careful mental discipline. 

1) Think of your Tor activity as pseudonymous and create in your mind a virtual identity 
to correspond with the activity. This virtual person does not know you and will never 
meet you and wouldn't even like you if he knew you. He must be kept strictly mentally 
separated. 

2) If you must use public Internet services, create completely new accounts for this 
pseudonym. Never mix them; for instance, do not browse Facebook with your real E-mail 
address after having used Twitter with your pseudonym's E-mail on the same computer. 
Wait until you get home. 

3) By the same token, never perform actions related to your pseudonymous activity via 
the Cleamet, unless you have no other choice (e.g. to sign up for a provider who blocks 
Tor) and take extra precautions regarding your 

location when doing so. 

4) If you need to make and receive phone calls, purchase an anonymous prepaid phone 
for the purpose. This is difficult in some countries, but it can be done if you are creative 
enough. Pay cash; never use a debit or credit card to buy the phone or top-ups. Never 
insert its battery or turn it on if you are within 10 miles (16 km) of your home, nor use a 



phone from which the battery cannot be removed. Never place a SIM card previously 
used in one phone into another phone. Never give its number or even admit its existence 
to anyone who knows you by your real identity. This may need to include your family 
members. 

4) Hidden Services 

These are big in the news lately, with the recent takedown of at least two high-profile 
hidden services. Silk Road and Freedom Hosting. The bad news is, hidden services are 
much weaker than they could or should be. The good news is, the NS A doesn't seem to 
have done much with them (though the NSA slides mention a GCHQ program named 
ONIONBREATH which focuses on hidden services, nothing 
else is yet known about it)3. In addition, since hidden services must often run under 
someone else’s physical control, they are vulnerable to being compromised via that other 
party. Thus, it's even more important to protect the anonymity of the service, as once it is 
compromised in this manner, it's pretty much game over. 3 Verify the most current state 
of intelligence on any enemy intelligence network. 

The advice given above is sufficient if you are merely visiting a hidden service. If you 
need to run a hidden service, do all of the above, and in addition do the following. Note 
that these tasks require an experienced system administrator; performing them without 
the relevant experience will be difficult or impossible. 

1) Do not run a hidden service in a virtual machine unless you also control the physical 
host. Designs in which Tor and a service run in firewalled virtual 

machines on a firewalled physical host are OK, provided it is the physical host which you 
are in control of, and you are not merely leasing cloud space. 

2) A better design for a Tor hidden service consists of two physical hosts, leased from 
two different providers though they may be in the same datacenter. On the first physical 
host, a single virtual machine runs with Tor. Both the host and VM are firewalled to 
prevent outgoing traffic other than Tor traffic and traffic to the second physical host. The 
second physical host will then contain a VM with the actual hidden service. Again, these 
will be firewalled in both directions. The connection between them should be secured 
with IPSec, OpenVPN, etc. If it is suspected that the host running Tor may be 
compromised, the service on the second server may be immediately moved (by copying 
the virtual machine image) and both servers decommissioned. Both of these designs can 
be implemented fairly easily with Whonix. 

3) Hosts leased from third parties are convenient but especially vulnerable to attacks 
where the service provider takes a copy of the hard drives. If the server is virtual, or it is 
physical but uses RAID storage, this can be done without taking the server offline. Again, 
do not lease cloud space, and carefully monitor the hardware of the physical host. If the 
RAIDarray shows as degraded, or if the server is inexplicably down for more than a few 
moments, the server should be considered compromised, since there is no way to 
distinguish between a simple hardware failure and a compromise of this nature. 

4) Ensure that your hosting provider offers 24x7 access to a remote console (in the 
hosting industry this is often called a KVM though it's usually implemented via IPMI 
which can also install the operating system). Use temporary 



passwords/passphrases during the installation and change them all after you have Tor up 
and running (see below). The remote console also allows you to run a fully encrypted 
physical host, reducing the risk of data loss through physical compromise; however, in 
this case the passphrase must be changed every time the system is booted (even this does 
not mitigate all possible attacks, but it does buy you time). 

5) Your initial setup of the hosts which will run the service must be over Cleamet, albeit 
via SSH; however, to reiterate, they must not be done from home or from a location you 
have ever visited before. As we have seen, it is not sufficient to simply use a VPN. This 
may cause you issues with actually signing up for the service due to fraud protection that 
such providers may use. How to deal with this is outside the scope of this answer, though. 

6) Once you have Tor up and running, never connect to any of the servers or virtual 
machines via Cleamet again. Configure hidden services which connect via SSH to each 
host and each of the virtual machines, and always use them. If you must connect via 
Cleamet to resolve a problem, again, do so from a location you will never visit again. 

7) Hidden services must be moved regularly, even if compromise is not suspected. A 
2013 paper described an attack which can locate a hidden service in just a few months for 
around $10,000 in cloud compute charges, which is well within the budget of even some 
individuals. It is safer, though not at all convenient, to move the hidden service at least 
monthly. Ideally, it should be moved as frequently as possible, though this quickly veers 
into the impractical. Note that it will take approximately an hour for the Tor network to 
recognize the new location of a moved hidden service. 

5) Conclusion 

Anonymity is hard. Technology alone, no matter how good it is, will never be enough. It 
requires a clear mind and careful attention to detail, as well as real-world actions to 
mitigate weaknesses that cannot be addressed through 

technology alone. As has been so frequently mentioned, the attackers can be bumbling 
fools who only have sheer luck to rely on, but you only have to make one mistake to be 
mined. We call them "advanced persistent threats" because, in part, they are persistent. 
They won't give up, and you must not.4 

II. TOR + VPN and Advanced Considerations5 

If you wish to proceed past this point you will need to have a deep understanding of 
exactly what a VPN is and how internet connections operate on a fundamental level. If 
any of the terminology used before confuses you then find somebody more competent to 
interpret the following section. Now for those who are still reading, Stallman may be 
some goony beard guy who supports some commie BS and is constantly crying about 
Trump but his website's pretty decent to dig through for info. His long term link is a good 
place to dig for sites that may house some decent info: https://stallman.org/longterm.html 
1) Assorted Topics and Considerations 
i) „I've got nothing to hide!" 

T've Got Nothing to Hide' and Other Misunderstandings of Privacy 

https://papers. ssm.com/sol3/papers. cfm?abstract_id=998565& 

Why Privacy Matters - Ted Talk 

https://www.ted.com/talks/glenn_greenwald_why_privacy_matters 



4 https://www.torproject.Org/download/download-easy.html.en#waming 

5 Additionally, this is old information, but still relevant: Hacker OPSEC - 
http://gmgq.github.io/ 


Prism break - https://prism-break.org/ 

ii) „What about TOR+VPN or TOR+proxies, is it worse than plain TOR?“ 

It can provide a benefit in certain circumstances. 

You-to-Tor-to-VPN-to-Clearnet will let you use sites that block Tor exits (unless they 
also block your vpn provider). You-to-VPN-to-Tor will prevent anyone observing your 
local traffic from knowing that you are connecting to the Tor network (though obviously 
they will know you are connecting to the VPN) Source: 
https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN 
You -> VPN/SSH -> Tor 

You can route Tor through VPN/SSH services. That might prevent your ISP etc. from 
seeing that you're using Tor (VPN/SSH Fingerprinting below). On one hand, VPNs are 
more popular than Tor, so you won’t stand out as much, on the other hand, in some 
countries replacing an encrypted Tor connection with an encrypted VPN or SSH 
connection, will be suspicious as well. SSH tunnels are not so popular. Once the VPN 
client has connected, the VPN tunnel will be the machine's default Internet connection, 
and TBB (Tor Browser Bundle) (or Tor client) will route through it. This can be a fine 
idea, assuming your VPN/SSH provider's network is in fact sufficiently safer than your 
own network. Another advantage here is that it prevents Tor from seeing who you are 
behind the VPN/SSH. So if somebody does manage to break Tor and leam the IP address 
your traffic is coming from, but your VPN/SSH was actually following through on their 
promises (they won't watch, they won't remember, and they will somehow magically 
make it so nobody else is watching either), then you'll be better off. 

You -> Tor -> VPN/SSH 

You can also route VPN/SSH services through Tor. That hides and secures your Internet 
activity from Tor exit nodes. Although you are exposed to VPN/SSH exit nodes, you at 
least get to choose them. If you're using VPN/SSHs in this way, you'll want to pay for 
them anonymously (cash in the mail [beware of your fingerprint and printer fingerprint6], 
Liberty Reserve, well-laundered Bitcoin, etc.). However, you can't readily do this without 
using virtual machines. And you'll need to use TCP mode for the VPNs (to route through 
Tor). In our experience, establishing VPN connections through Tor is chancy, and 
requires much tweaking. Even if you pay for them anonymously, you're making a 
bottleneck where all your traffic goes - the VPN/SSH can build a profile of everything 
you do, and over time that will probably be really dangerous. 

VPN/SSH Fingerprinting 

Using a VPN or SSH does not provide strong guarantees of hiding the fact you 

(6 WARNING: Your printer may leave identifying microdots on the page) 

are using Tor from your ISP. VPN's and SSH's are vulnerable to an attack called Website 

traffic fingerprinting 



1) Very briefly, it's a passive eavesdropping attack, although the adversary only watches 
encrypted traffic from the VPN or SSH, the adversary can still guess what website is 
being visited, because all websites have specific traffic patterns. The content of the 
transmission is still hidden, but to which website one connects to isn't secret anymore. 
There are multiple research papers on that topic (See footnote). 

2) Once the premise is accepted, that VPN's and SSH's can leak which website one is 
visiting with a high accuracy, it's not difficult to imagine, that also encrypted Tor traffic 
hidden by a VPN's or SSH's could be classified. There are no research papers on that 
topic7. 

What about Proxy Fingerprinting? It has been said above already, that connections to 
proxies are not encrypted, therefore this attack isn't even required against proxies, since 
proxies cannot hide the fact that you're using Tor anyway. 

iii) Chain VPNs and Metadata: 

Unlike what is often wrongly assumed, metadata is extremely powerful, and chaining 
multiple VPNs or using simply a VPN or Tor is not that safe. The following may allow 
you to better evade detection via Metadata: 

https://security.stackexchange.com/questions/121733/how-can-meta-data-beused-to- 
identify-users-through-chained-vpns/121738#121738 

7 Examining research papers on related topics is a must for SS members in charge of 
INFOSEC and/or OPSEC. 

2) Best Linux distro 

Due to constant debate and fanboyism regarding various distributions of the Linux 
OS no one version is to be entirely recommended8. The user is asked to look at the 
features of each distribution and the intention behind using it and hardware it will 
be booted on. You can dual boot most Linux distributions or live boot them from a 
USB or CD/DVD. 

III. Operating „in the Open “ 

INFOSEC is only part of OPSEC. OPSEC largely relies on your behavioral patterns. A 
vital part of those patterns is your shopping decisions and daily routine. Consider the 
following section to be a warning against short-sighted and enemy-supporting 
consumerist choices. The ideal revolutionary National Socialist WILL NEVER BETRAY 
HIS RACE OR NATION FOR CREATURE COMFORTS! 

1) OPSEC ruminations by An Anon With a Clue™ 

If every tree falling in every forest might soon be heard by an internet-connected 
microphone, what hope is there for our privacy?9 When you’re sitting in a room with an 
iPhone (spy phones), an Apple Watch (spy watches) and a smart assistant like Amazon 
Echo or Google Home (spy appliances), you’re surrounded by a dozen microphones. 
(Newer iPhones have four and the Echo has seven, while the smartwatch has just one, for 
now.) Add in the latest smart wireless headphones (bug phones) — Apple's expected 
next-generation Air Pods (spypods) or competing ones from Bose or Shure — along with 
talking microwave ovens (spy ovens) and TVs (spy TVs) from Samsung, LG and others, 
and anyone at home or in an open-plan office could soon be within earshot of hundreds of 



microphones. 

The roadmaps of tech giants and startups alike show how sound is poised to become the 
first ubiquitous connection between users and the artificial intelligence hive mind the 
internet is becoming. Driving this change are massive volumes of components, originally 
designed for smartphones and other mobile devices. Cancer grows after all. For a 
hundred years, microphones consisted of a relatively large membrane whose vibrations 
were converted to electrical impulses. But starting in the 1980s, engineers worked out 
ways to make microphones tiny, bordering on microscopic. Most still have a pocket of air 
trapped behind a vibrating element, but now they can be carved out of silicon, just like 
the microchips to which they’re attached. Smartphones, smart speakers and any other 
gadget that listens for your voice all use these kinds of microphones. 

8 Ubuntu or Mint 

9 https://archive.fo/ivOqa 

One ongoing challenge for microphones has been physics: The smaller microphones get, 
the more of them you need to capture a sound, and the more processing of that sound is 
required. Startups such as Boston-based Vesper Technologies, Inc. — which has received 
money from Baidu, Bose and Amazon’s Alexa Fund — are meeting the challenge with 
even tinier, yet more capable designs built around minuscule flaps of silicon that generate 
electric current when bent by sound waves. Vesper claims this gives their microphone 
unique capabilities, like understanding your voice even in windy conditions, and drawing 
zero power when awaiting a “wake word,” since sound itself generates the power the 
microphone needs. We’re moving toward a world in which everything with a plug or 
battery can respond to a voice command. Apple’s next Air Pods (spypods) could have 
many of the capabilities that Vesper claims its microphones will enable, such as built-in 
noise cancellation. (In the past, Apple has used several suppliers for its microphones.) 
Meanwhile, the CEO of Samsung’s consumer-electronics division recently told The Wall 
Street Journal that by 2020 his company plans to equip every single device it sells—from 
TVs to refrigerators—with microphones. It could be unnerving to be surrounded by 
listening devices, but the paradox is that as the technology develops, so does our 
ability to free these gadgets from having to connect to the internet. 

Consider the voice-controlled trash can (spy cans) from Simple human. Say “Open can” 
and it opens—and then closes on its own once the user walks away. That's it. It’s easy to 
make fun of a high-tech trash can, especially one that costs $200. As anyone who lives 
with multiple virtual assistants can attest, it is tricky to talk to one without inadvertently 
involving the whole crowd. 

Consumers must do everything to stop this from happening and BOYCOTT all 
these spy products.10 

2) Physical OPSEC and Usage Behaviourll 

The following list of 17 points was written with the absolute human limits of OPSEC in 
mind. It is to be followed by the most committed of resistance warriors. 

1) Don’t use social media. Avoid Facebook/Myspace/ Twitter/ Snapchat/etc. 



2) Forward secrecy (keep your mouth shut about any personal info if you don't want to 
expose yourself) 

3) Use a cheap private VPN (w/ no IP logging) and Tor browser! 

4) Always disconnect your internet (physically) when you are not going to use it! Make 
sure Bluetooth and Wi-Fi is physically disabled. Don't keep it online all the time! If you 
do, you are asking to be hacked! 

10 https://archive.fo/u2rcj 

11 http://archive.is/lM6ZA 


5) Use an old "flipper" phone. AKA a jitterbug. Cover up any camera if has one. 
Jitterbugs are basic cellphones for the disabled/senior citizens. Just a bare basic cell 
phone where you can take out the battery. Has no internet platform. 

6) Flock to flea markets, garage sales, thrift shops to buy older electronics! Do not buy 
'smart' or 'green' appliances! Learn how to maintain and fix older products/utilities too! 
All IoT (Internet of Things) tech can be used to spy on you, avoid IoT! 7) Never put your 
real name or personal info into your computer, always use FAKE names / aliases 12. 

8) Face-to-face relationships are the best kind. Don't be afraid to hang with your friends 
now and then. 

9) Always bleach your browser cache / cookies / web logs! 35x Gutmann style (See 
footnote)! (Bleach bit, CCleaner, etc.) 

10) No OS is safe. Just exclude as much personal information you can from your 
Operating System. Make sure its disconnected offline when not being used! Make sure 
Bluetooth and Wi-Fi is also physically disabled when not in use. 

11) Browser Security: Use Noscript add-on. Noscript is a must: make sure to block all 
global scripts, wipe the whitelist in Noscript and re-configure the whitelist that best fits 
your browser habits. IPFlood is also a useful add-on to 

obfuscate IP GET requests. You should use Random Agent Spoofer (or Blender) to spoof 
your browser & OS metadata while you surf the web, making it a lot harder to track your 
activity. Tin Foil is another great security addon. 

12) It's best to have two computers, rather than just one. For example, have one just for 
banking/legit LEGAL purposes. Have another one (completely separated) just for private 
or illegal activity. Make sure you don't put any personal info in the private computer. 

13) Use encryption and strong passwords! Write them down on a piece of paper or 
memorize them. DO NOT store passwords on a computer file. That is a big no-no! Try 
easy to remember long sentences for passwords and combine all the words together. The 
more characters used, the harder it is for hackers to break the passwords. 

14) Have separate email accounts for each kind of activity. 

15) Make sure you physically disconnect your web cam or cover it up with black 
electrical tape. Most laptops these days come with web cams attached above or below the 
monitor. Make sure the camera cannot be used to identify you or spy on you in any way. 

16) Avoid new "Smart TVs"! If you have a newer TV, make sure you cover up or unplug 
the camera and microphone. Or, keep it offline and disconnected from the cable box 



when not in use. You could cancel cable and rip DVDs of your favorite movies and 
shows instead (See footnote), using it for offline purposes only. 

12 Note: the person who wrote this was too paranoid. Take the information provided as 
the absolute highest possible safety standards, beyond what is reasonable. 

17) Avoid all new digitized vehicles. They can easily be hacked, used to spy on you and 
even be remotely hijacked by criminal entities/govemments! 


3) Meta data usage 

i) Examples of Meta data usage 

The following list may he written in a humorous manner, but the information contained 
within is dead serious. Do not let your operation get blown up by metadata leakages or 
anomalies. 

1) When 2 phones go offline simultaneously and then go online again simultaneously, 
then the likelihood that those 2 individuals have just met, and are engaged in a secret 
enterprise, is high. 

2) One number goes offline and then another goes online (sim switching). 

3) Uncle Ahmed calls Afghanistan suddenly every week; perhaps this means uncle 
Ahmed decided he wants to be famous and fuck goats in heaven. 

4) Keywords being heard on the mic (processed locally by the user's device) are a good 
way to efficiently gather intel. 

5) Jake scored very high on the online IQ test: searches for keywords like "terrorist 
attacks", "explosives", watches goat-pom-in-heaven vids, visits extremist sites, uses Tor, 
honeypot-VPNs; well Jake must be monitored. 

6) AI has made similar surveillance extremely effective. 

7) Since AI have made it harder to hide, it's important to be clean when using the internet 
without prior procedures. That way even if they ever decide to pin something on you to 
neutralize you, they can't do so easily. 

8) Another exploit they can use (if they have access to ISP logs) is meta data from Tor 
usage. E.g. you start using Tor at about 6:00am every night, and at 6:05am there is only 
one person posting on a revolutionary forum for 30'. Then the moment the posting stops, 
you close Tor and start browsing the internet normally. 

These are all examples of meta data which can be used by the enemy to identify your 
online presence. 

4) Further OPSEC related resources 

Prevent yourself from being doxed - http://archive.is/deaBB 

https://pastebin.com/8zGxwtEB 

Further anti-dox OPSEC procedures - http://archive.is/lgJCN 
Removing exif and meta data - http://archive.is/Cf2Sf 
Create false leads - http://archive.is/hPlwm 



5) Secret Meetings 
Secret Meetings Guide 

A security service like the FBI can only achieve its objectives by intercepting 
communication between people. This means you can beat the security service if you can 
deny them the ability to overhear your meetings with your contacts. Of course, this guide 
is to be interpreted not through an American lens but with the correct local political 
dynamics in mind. 

Does your local anti-National Socialist security agency rely on SIGINT or HUMINT 
more? Are you unsure? Study your enemy. 

Contents 

1) What you'll learn here... 

2) Step-by-step instructions... 

a) Step 1 

b) Step 2 

c) Step 3 

d) Step 4 

e) Step 5 

f) Step 6 

g) Step 7 

3) Spook talk... 

1) What you'll learn here... 

This section teaches you how to check for surveillance before you meet with a 
clandestine contact. You'll learn a protocol that will beat security services like the FBI, 
BATF, DEA, and others. The method is particularly effective against standard police 
surveillance. It also works against the so-called inspection teams of the IRS. 

Tradecraft origins: The method described in this article was originally devised in 1943- 
1944 by countersurveillance expert Anthony Blunt for Britain's MI.5. Unfortunately for 
the British, Blunt was a deep-cover agent for the KGB. Six years later. Blunt taught the 
protocol to his new KGB controller, Yuri Modin. Together they perfected the technique 
as it is known today. They successfully thwarted MI.5 surveillance for three years, 
sometimes even meeting daily to exchange information and top-secret documents. In 
effect, Blunt was using his inside knowledge of MI.5's surveillance techniques to beat 
them at their own game. 

Proliferation: This countersurveillance method has since been adopted by Israel's 
Mossad, Germany's BND, Russia's KGB (now the SVR), the American CIA, and many 
others. The protocol is taught by intelligence agencies to their controllers - these are the 
intelligence officers who manage and meet with deep cover agents in foreign countries. 
The method is also being used today by resistance movements and urban guerrilla groups. 
When this countersurveillance protocol is methodically applied, it is extremely difficult 
for a security service to breach your security. 



2) Step-by-step instructions... 

Here's a hypothetical situation. Assume that you and I wish to meet clandestinely. 

We wish to ensure that our meeting is not observed by a surveillance team. You and I 
have previously agreed upon a place, date, and time. In addition, we are familiar with 
each other's appearance - we can recognize each other on sight. 

Step 1: You and I independently arrive at the previously agreed-upon general location. 
Rather than fixing a specific location, we agree to be only in the general vicinity. This is 
an important principle. This might be a large park, a residential district, etc. The location 
must be outdoors and free of video surveillance cameras. It should also be selected with 
the intention of thwarting telephoto lenses. You and I should each know the area well. 

The location should provide reasonable cover for each of us being there - strolling in the 
park, walking through a residential area to a bus stop, convenience store, etc. 

Step 2: You and I will eventually make eye contact at some distance from each other. We 
do this discretely, so others are unaware. I use a pre-arranged signal to alert you that I 
have spotted you. Perhaps I'll throw my jacket over my shoulder, or remove and clean my 
sunglasses, etc. The signal must be a natural movement that does not attract unwanted 
attention. 

Safety first: Even though you and I have seen each other, we do NOT approach each 
other. This is an important safety valve. If either of us has grown a tail we do not want to 
compromise the other person. 

BACKGROUND: The phrase grown a tail is spy-talk for being under surveillance. The 
phrase is somewhat inaccurate, because they don't just follow you, they often surround 
you. 

Step 3: When you see my signal you simply walk off. Then I follow you in order to 
ensure that you're not being watched. I carefully check for the presence of a floating-box 
foot surveillance team. I check for agents at fixed observation posts. I also watch for 
drive-by support from a floating-box vehicle surveillance team. 

BACKGROUND: In particular, I may follow you, I may walk parallel to you, I may 
occasionally walk ahead of you. The goal is simply to be nearby so I'm in a position to 
detect surveillance around you. I always remain at a distance from you, of course, never 
approaching too closely. 

Step 4: When I have satisfied myself that you are clean, I again signal you. Perhaps I re¬ 
tie my shoe laces. 

Step 5: Now we reverse roles and this time it is I who simply walks off. 

You begin to follow me in order to ensure that I'm not being watched. You check for 
floating-box foot surveillance, fixed observation post foot surveillance, and drive-by 
support by a vehicle surveillance team. What to look for. You carefully watch for persons 
who are pacing me or moving parallel with me. You check for persons loitering at 
positions with a good line-of sight to my location. You watch for an ongoing pattern of 
people coming and going 

that results in someone always being in a position to monitor me. You watch for vehicles 
dropping someone off ahead of me. 

Step 6: When you are satisfied that I am clean, you signal me that I'm not being watched. 



(On the other hand, if you suspect that a surveillance team is in the 
vicinity, you simply abort the operation and walk away.) 

BACKGROUND: You must trust your instincts, because if something seems not quite 
right it's better to he safe than sorry. Many people are surprised to learn that it is not 
difficult to detect a surveillance team watching someone else. This is the subtle elegance 
of Blunt's countersurveillance system. And the goons are helpless against it. 

Step 7: You and I can now approach each other and meet. After our discussion we agree 
upon the date, time, and location of our next clandestine meeting - as well as two backup 
plans in case the meeting is thwarted by surveillance. If we are unable to meet at the first 
venue we will use our fallback position and we will meet at the same time and place one 
week later. If we are unable to make that meeting happen, we will shift to a previously 
agreed-upon failsafe plan and we will meet at a different location at an agreed-upon date 
and time. Neither you nor I writes down the particulars of our next meeting. We commit 
the details to memory. 

BACKGROUND 1: If you have any documents to give me, I will not accept those 
documents until the final moments of our meeting. I will have already started making my 
getaway when I accept the documents. This reduces the chance of discovery and arrest by 
a surveillance team that has managed to elude our countersurveillance protocol. If the 
security service acts too quickly, they will have no evidence against me, because the 
documents have not yet been passed to me. 

BACKGROUND 2: The best agents never mix discussion and documents. If a document 
is to be passed, no discussion occurs. The entire contact takes only a moment - the perfect 
brush pass. The principle is simple. It is foolhardy to stand around holding incriminating 
documents. 

Spook talk... 

Spies in North America call this seven-step protocol for countersurveillance dry-cleaning. 
In Europe, it is called parcours de securite - a French phrase which can he translated as 
security run or security circuit. 

5) USB dead drops 

Create a USB Dead Drop in Nature by DIY Hacks and How To’s 

Dead drop is an anonymous, offline, peer-to-peer file sharing network in public space. 
This network is made up of USB drives that are embedded in walls, buildings and other 
public places. Anyone is free to access, download, and upload. It is very similar to 
geocaching but with data. The first USB dead drop network of five locations was created 
by Berlin-based artist Aram Bartholl in 2010. Since then, there have been over 1,000 
dead drop locations that have been registered at deaddrops.com (WARNING: 
deaddrops.com is as of July 2018 a 3rd party, be sure to make yourself aware of 
whether their status has changed politically). 

For a walk through of how to set up a standard USB dead drop, check out this instruction 
by user frenzy. Up until now, this has been mostly restricted to urban locations. In this 
instruction, I am going to attempt to expand this project beyond city limits by showing 
everyone how to embed USB drives in natural fixtures such as trees and rocks. 



Contents 

1) Materials 

2) Remove the Housing of the USB Drive 

3) Wrap the USB Drive in Plumber's Tape 

4) Select a Dead Tree or Stump as a Dead Drop Location 

5) Drill Holes in the Trunk to Make Room for Your USB Drive 

6) Apply the Wood Glue and Insert the USB Drive 

7) Finished Dead Drop Site 

8) Stone Dead Drop Location 

1) Materials 

To install a USB drive in a tree, you will need the following materials: 

Materials: USB flash drive, Plumber's tape, Wood Glue 

Tools: Cordless Drill, Drill bit, set Screwdriver, or other tool to pry open the flash drive 

2) Remove the Housing of the USB Drive 

The first step is to open up the housing of the flash drive and remove all the unnecessary 
plastic. You can usually pry open the housing with a small screw driver or knife. Another 
option is to just squeeze the housing with a pair of pliers at the seam. Continue removing 
parts until only the USB connector and the circuit board remain. 

3) Wrap the USB Drive in Plumber's Tape 

Applying a layer of plumber's tape around the circuit board of the drive helps to keep it a 
little more protected. Don't go overboard, one or two layers is plenty. 

4) Select a Dead Tree or Stump as a Dead Drop Location 

Select a dead tree to locate your dead drop. I do not recommend using a healthy tree for 
this project. In addition to the damage caused by drilling, the cavity that you create also 
provides a potential site for mold, rot and insects to take up residence. Because of this, I 
recommend using a tree that is obviously dead, fallen over, or just a stump. 

5) Drill Holes in the Trunk to Make Room for Your USB Drive 

The USB connector and board of a typical USB drive is about 0.5 linch (13mm) wide x 
0.20inch (5mm) thick. There are a number of ways that you can drill out a slot to 
accommodate for it. The simplest and fastest method is to drill a single hole that is large 
enough to fit the whole drive inside of it. A 1/2" drill bit will usually suffice for this. 

If you want to make a smaller imprint on the surface and make the end product look a 
little cleaner, you can drill a series of smaller holes in a line to make a slot. Each hole 
should be the same thickness as the USB drive (about 0.64cm). Then you can finish the 
shaping with a knife or file. 

Be sure to drill your hole is a part of the tree that is solid and free from rot. 

6) Apply the Wood Glue and Insert the USB Drive 

Clear the saw dust and wood shavings from the hole by blowing on it. Then fill the hole 
most of the way with wood glue. Slowly insert the USB drive into the hole until the back 
edge of the metal on the connector port is even with the surface of the tree. Some of the 
glue will squeeze out around the edges. Wipe off the excess using some nearby leaves. 
Once the glue dries, you have a USB dead drop site out in nature. If you wish to prolong 
the life of the drive, you can put a cap on it (or over it) to at least partially protect it from 



the weather. 

7) Finished Dead Drop Site 

The last step is to upload the instruction text files and any other fdes that you want to 
share. 13 To document the dead drop location, it helps if you take three pictures of the 
location (up close medium and far away). This makes it easier for others to find your 
dead drop. 

8) Stone Dead Drop Location 

You don't need to limit yourself to just trees. You can also setup a dead drop in stone. 
The process for this variation is identical to the original procedure that is used for brick 
and mortar locations. Just find a relatively soft rock, drill the hole with a mortar drill bit 
and use a concrete patch or fast drying cement instead of glue to fill the hole. 14 

13 Reminder: deaddrops.com is a 3rd party 

You can find the readme file here: http://deaddrops.com/download/readme.txt 

14 http://www.instructables.com/id/Create-a-USB-Dead-Drop-in-Nature/ 


6) Party van with Pirate Box and Botnet 

This concept is only for the most dedicated and technically capable. Implementing it 
requires determination, good driving and an intimate knowledge of INFOSEC. It has 
been dubbed the „Party van" since inside of it you will be having a continuous party, but 
there is another Party Van which has letters belonging to an „Alphabet Soup" agency 
attached to it awaiting you if you go for this method. 

Are you mentally strong enough to becoming a bit buccaneer? 

What you need: 

1) A van or truck. A rental vehicle is recommended, though the security thereof is 
questionable. Intimate knowledge of the vehicle and any digital subsystems it may have 
is a necessity. 

2) A „pirate box" hacked router and antenna set-up. 

3) A small team of 2-5 revolutionaries who are all skilled drivers. 

4) Food rations, as you will be driving almost continuously for the entire operation. 

5) A route plan - DO NOT DIGITIZE THE ROUTE PLAN! 

6) A „zero-day“, or list of common Wi-Fi exploits, in order to hack nearby Wi-Fi 
modems. 

7) Knowledge of how to maintain and operate a botnet, which is the product of this 
endeavor and can then be used against enemy digital networks. The concept is simple. 
You buy rations and get your other supplies stocked up. 

Then you drive along your route at a leisurely pace hacking as many Wi-Fi routers 
(automatically! Write the script yourself!) along the way as come into range of your 
signal. Law enforcement will not identify you as long as you stay on the move and avoid 
boosting your signal too strongly. Ideally, your connection request should not be visible 
to nearby Wi-Fi users. Ultimately this method depends greatly on personal computer and 



communications proficiency and is recommended in order to build a botnet within a week 
or so of continuous driving (take shifts, make sure proper vehicle maintenance is 
observed prior to departure and use cash at gas stations). 

The success of such a mission depends on careful planning of digital resources and 
knowledge of both cellular and 2G/3G/4G networks. If your ISP notices irregular 
behavior and decides to remove you from their system you must have plans around this 
eventuality. Dynamic IPs and multiple (or spoofed) device IDs are essential to maintain 
connectivity to the network, or it is entirely possible to perform the operation „offline “if 
your configuration settings are adequate and you do not plan on immediately activating 
the botnet. The topic of botnet management should be carefully planned and directly 
connected to the following attacks on enemy network infrastructure. 

You may picture yourself as a pirate, but first and foremost you are a National 
Socialist and any use of the botnet for personal gain will be identified and punished 
by your allies. 


IV. Tactics against Law Enforcement Officers 

1) Dealing with Law Enforcement 

Golden Rule: Ask for a lawyer immediately upon contact and say nothing. 

Do not fall for the tricks which enemy law enforcement may play. Nothing you say 
can help you. Law enforcement officers are not in a position to offer you a plea 
deal, only the prosecution is, and even then you are guaranteed a politicized 
verdict for having opposed their Jew cabal and stood for the liberty of your Volk. 
Judges do not need to accept the plea bargain either. Law enforcement use 
various techniques to try and get a confession. They will try to minimize your 
behavior and make it seem wise to agree with them. This is a trick. An in-depth 
guide to law enforcement interrogation techniques is not required, because all of 
their techniques can be countered by refusing to speak and asking for a lawyer. 
Contents 

1) LE knocked on my door 

2) I am being offered a deal if I turn states witness 

3) LE is requesting to search my house or car 

4) I got arrested and am being interrogated 

5) If I ask a cop if they are a cop, do they have to tell me 

6) Do LE smoke weed or use other drugs 

7) I am non-important/don't do anything wrong 

8) When I talk online I like to say SWIM (someone who isn't me) 

So LE knocked on my door and asked to talk to me. They say that they know I 
have been up to no good, and that it will be better for me if I talk to them. 

What should I do? 

You should under no circumstances talk to LE. They are not your friends 15, although 
they may pretend to be. Anything you say can and will be used against you in court. In 



fact, anything you say will be twisted to put you in the worst possible light. Even if you 
think you are saying something innocent, LE can twist it against you. So, it is best to say 
absolutely nothing. Don't try to outsmart them in an interrogation, this is not a game, if 
they think you are the sort of person that sees things as a game they will try and make 
you feel smarter than them when they question you, but in reality they are just getting 
you to talk more. When questioned by LE, you should immediately request to talk to your 
lawyer, and nothing more. Everything you say to LE should be said through a lawyer, in 
all cases. 15 Unless the officer makes it clear that they are an SS member and 
investigating the enemy. Then discretion should be used, though generally LE are to be 
treated politely and with support for their role in maintaining societal integrity. However, 
many LE do not understand the war effort. Reading the body language of an LE will help 
you determine their intentions towards you and the cause. 

Additionally, remember that destruction of evidence is a crime in many 
places (like the United States). Turning your computer off is not destruction of 
evidence, even if you are using whole disc encryption (and thus having the computer 
turned off makes the data inaccessible to the investigators); hitting your computer with a 
hammer, shooting it with you gun, or throwing it into your swimming pool when you see 
the police walking to your door is destruction of evidence, and you could be sent to 
prison for it (even if you are found "not guilty" of the crime itself). You can face a 
destruction of evidence charge even if the investigators manage to recover the evidence 
you tried to destroy. If you have incriminating evidence on your hard drive, you should 
be using encryption, not relying on your ability to destroy your computer. 

So it is looking like I am going to be doing a bid in prison, but I am being offered a 
deal if I turn states witness. Should I do this? 

It is true that you can in some cases get reduced sentences by becoming a confidential 
informant. But would you rather spend five years in prison getting abused and spit on, 
possibly killed, or spend ten years in prison being left alone for the most part? Snitches 
are despised more than anyone else in prison, and some of the people you will be locked 
up with (Communists, Life-sentence etc.) have nothing to lose. Guards are known to 
reveal information on inmates to other inmates, so don't think you are going to keep your 
snitch status secret. Even if you are kept in protective custody you will not be safe, when 
prison riots happen the first thing that happens is the inmates kill everyone in protective 
custody. In addition to putting your life in serious danger, helping the enemy makes you a 
coward and a hypocrite. Keep in mind that even if you take a deal to snitch, that has no 
legally binding power, your sentence is still up to the judge. Although the mandatory 
minimum is erased when you take a deal, you can still get the maximum sentence if the 
judge says so, even after you already snitched. This has been known to happen. Even if 
you get put in the witness protection program and given a new identity, people in witness 
protection can be traced. Snitching is never worth it, and it is never the right thing to do. 
Don't do the crime if you can't do the 
time without snitching. 16 

So I got pulled over, or got a knock on my door, and LE is requesting to search my 



house or car. What should I do? 

Tell them no. Never consent to be searched or have your vehicle or house searched. Make 
them get a warrant. Even if you have nothing on you and your vehicle and house are 
clean, you should make them get a warrant. You don't want to make their job easier. If 
you don't consent to a search and they search anyways with no warrant then any evidence 
they gather cannot be used in court. If you consent, they don't even need a warrant. 

16 This advice is mainly for your protection. Cooperation with SS aligned LE is perfectly 
valid, AFTER the Zionist Occupational Government in your Nation or local area is 
ousted. You must assume that LE will not protect you adequately. 

So I got arrested and am being interrogated, what do I do? They say if I don't 
cooperate they are going to make things hell for me and put me in a holding cell 
with a bunch of gang members! But if I confess they will make things 
very easy for me. 

Ask for your lawyer. If they don't immediately stop questioning you, continue asking for 
your lawyer. You don't ever want to say anything to cops. Even if they put you in a 
holding cell full of gang members, it is probably better to be there for a day than to 
confess and get sent with the same gang members for ten years. Anyways, most gang 
members are unlikely to mess with you if you just keep to yourself and don't cause any 
trouble with them. Keep in mind: police lie, secret service lie, they want you to confess, 
confessing or giving any information up is going to hurt you it is under no circumstances 
going to ever help you. 

If I ask a cop if they are a cop, they have to tell me right? 

No, cops do not have to tell you they are cops, neither do secret service. Undercovers lie 
all the time. So, do confidential informants. Be careful who you trust, even friends you 
have known your entire life can turn. 

But what about smoking weed or using other drugs? Can they do this too? 

Undercovers can smoke weed, and I am sure they will have no issues using other drugs 
either. Someone using drugs does not mean that they are not a cop or secret service agent. 
It also doesn't mean they are not a confidential 
informant. 

But I am non-important / don't do anything wrong / am small time 

Even if you do nothing wrong, most LE wants to screw you. The majority of them are not 
trying to protect and serve but are trying to meet some alpha male requirement they 
subconsciously have. They feel important when they bring you down. Also, people tend 
to minimize what they do, so you are probably bigger than you would like to admit. Be 
proud but silent of your achievements for the revolution. 

When I talk online I like to say SWIM (someone who isn't me) instead of me or I. 
This keeps me safe right? 

No, this offers you no protection at all. People who say SWIM are just fooling 
themselves. People tend to like to have "security blanket security" where they convince 
themselves they are safe as long as they do some simple ritual (as opposed to taking 
actual security precautions, which are a bit more difficult). Security blanket security is 
dangerous, as it doesn't offer real security but makes you act as if you are secured. 



Appendix B: Modern Weapons Outline 

Blunderbusses, and other homemade guns can be researched online, as well as slingshots 
and various low-tech „fool proof “weapons. It is also possible to create basic projectile 
weapons and guns through experimentation, though care is to be taken when testing and 
using said guns as unrifled barrels or explosions in the firing chamber may prove highly 
dangerous. They fall outside of the scope of this guide due to their variety and 
abundance. Local factors and ammunition types are to be carefully considered when 
manufacturing or acquiring guns (projectile weapons) and ammunition (projectiles). 

In the original SS Werwolf guide this is explained in detail. Other military manuals and 
gun manufacturing guides 17 can be acquired online or via associates who participate in 
related activities. 

Described in this Appendix are modern weapons which are not commonly found, or mass 
produced. Additionally, explosives, molotov cocktails and swiss army knives are 
detailed. 

I. Modern Weapons Shortlist 

1) Microwave gun 

This gun can be classified as a directed energy weapon. It is known colloquially as the 
Poor man's Ray Gun “as it is a simple microwave oven conversion. Microwave oven 
magnetrons are inexpensive and easy to manipulate, though extreme caution should be 
used as the voltages involved are lethal. A grounded understanding of electrical 
engineering is recommended before construction, though ultimately it is up to the risk 
tolerance of the individual to engage in the manufacturing of such a weapon. As with the 
Laser gun manual below, the intention should be to bum the enemy (or drone) to the 
death, not maim their eyesight. This should be done by aiming at the neck or head 
depending on the power of said beam. Skin will char so to achieve the desired lethal 
effect it is important to maintain aim. Alternatively, it can be used to seriously wound the 
enemy by targeting either exposed regions of 

skin, light clothing or grenades/explosives attached to their utility belt. Other longer 
wavelengths than the two mentioned, can be engineered in order to 
penetrate and boil enemies alive though the power consumption for this and potential for 
melting of components hinders the effectiveness of these weapons. 

Ultimately, it is up to the individual in order to determine the best radiation frequency 
and amplitude to employ in the field. Caution and careful operation of such guns is 
vital to prevent loss of good will and morale among friendly forces. 

17 An excellent collection of gun related materials: http://archive.is/yAiQi 
„Poor man's Ray Gun“ - Microwave oven conversion: 
https://www.yumpu.com/en/document/view/33249254/the-poor-mans-raygunpdf 


2) Laser gun 



How to Make a Laser 

WARNING: Lasers cause blindness or eye damage and, as with Microwave guns, 
using it near civilians or children is strictly forbidden and those who do so will be 
executed either by the enemy or by friendly forces. 

First of all, let's review the Laser concept: L.A.S.E.R. stands for Light Emission by 
Stimulated Emission of Radiation. Lasers work, basically, like this: 

1. A substance (usually a gas, although crystal lasers are made as well) is heated to the 
point where it begins to emit Photons. This substance is held in a tube. 

2. The Photons reflect off mirrors on either side of the tube. 

3. Eventually, the focused Photons will break through one of the mirrors and the actual 
laser beam will emit from the front of the tube. Although Lasers are used in multiple 
types of light, we will be focusing on the Visible Spectrum. The Visible Spectrum of 
Light varies for each person, but generally extends from around 380 nm (Violet) to 
around 700 nm (Red). Red (600-700 nm) are some of the most common lasers. They are 
also some of the 

easiest to obtain. 

Some recommended materials: 

1-Adjustable Voltage Regulator LM317T 

1- 100 ohm Potentiometer 

2- 10 ohm Resistors 

1- 1N4001 Rectifier Diode 
1- 47uf 35v Capacitor 
1- Any Size PCB Board 
1- Any Solder 
1- Any Soldering Iron 

1- Power Switch (I like momentary push buttons) 

1- 12x30mm Aixiz laser housing Click Here 

2- Spools of wire (Red and Black) 

You will need at least a 6 volt Power source. 

You will also need something to put everything in when you are done, (a flashlight works 
if you can make the circuit small enough to fit in it) If you do not use a flashlight you will 
need some form of battery holder. 

Optional: Digital Multimeter 

(may he needed if you run into problems during construction or prototyping). 


i) Laser Diodes 

Laser Diodes are tiny. Creating them in a DIY setting is costly and time-consuming and 
they are usually manufactured by precision machines. Harvesting a laser diode can be a 
tricky process as they tend to be very fragile and sensitive to static and other forms of 
shock. It is very important to take your time in harvesting your precious diode. Do not 
ever drop it! 



Below is an image of a Diode: 



You will need an old DVD Writer. Blu-Ray works as well (you will have a violet laser 
instead of red, but it does work). You can extract one from an old computer. Also, the 
Writer must have AT LEAST 16X Writing Speed. If you use a Reader, or anything less 
than 16X Speed, you will end up with a weak red laser. 

The first step in harvesting your laser diode is to disassemble your DVD drive. There will 
be 4 or more screws on the bottom side that you will need to remove. 

Remove the plate on the back of the writer remove any circuit board under that until you 
see the sled. 



(Inside the Drive) 








(Typical Drive) 


Inside you will need to locate the laser assembly. It will be on 2 metal rails. At the ends 
of those rails will be more screws to remove. Once they are removed you will be able to 
lift the rails and slide the laser assembly right off. 

On the right side of the page is a picture of the exact component you should be removing 
from your drive at this point. 



Get the smallest screwdriver you can find. The sled consists of lots of small (very small) 
screws, usually glued in. Remove every screw you possibly can, some won't come out, 
but get most of them. Remove any parts you can. There will be TWO diodes, and they 
will not look like the above picture at first. There will be three pins on each one, with 
solder connecting them to something resembling a circuit board. They are attached to a 
small metal heat-sink and the lens on glass end will be facing the series of mirrors and 
lenses focusing the beams to the center lens of the sled. The following procedure is 
VERY delicate. You need Solder wick, a Soldering, Iron, and Pliers. Place the Solder 
wick directly on top of the three pins. Heat up the wick and remove all of the solder off 
both of the diodes. Remove the circuit-board-like thing from the pins. BE CAREFUL, 












those pins MUST stay intact. The more you can keep on the better. 



Once it is off (you may need to use forceps to wrestle it off, eventually it will come, just 
keep at it), you will need to remove the heat-sinks. There is an opaque glue connecting 
them to the sled. Insert your screwdriver (smaller 

the better) on the glue and pry it off. Try to go under the base on the glue. 

Once all 4 comers are off, remove the heat-sink/diode. Get both of them off. Now, this is 
the hardest part. If you are doing it right, it still seems like you are going to break the 
diode. Do not be afraid, but do not be reckless either. Take your pliers in your hand. You 
may need wire cutters. Press down on the heat-sink on one of the sides. If you need a vise 
or other support, use it. Eventually, the heatsink will split in half and the diode will pop 
off. 

You will have to pry the diode out. It may be easier to remove the whole part that the 
laser in encased in, it is usually a metal heat sink of some sort. After you do that you can 
use pliers to hold the metal part and use wire cutters or 

another pair of pliers to pry it away from the diode. In some cases, you will get lucky and 
the diode will pop right out very easily without anything else. 

Be careful the diode is fragile! 

Once the diode is out, you will need to solder the ribbon or whatever is soldered on to it. 
When that is done take your diode and place it somewhere safe and static free. If you 
have bought any pc components recently they probably came in a static protective bag. if 
you have one you can store your diode in it for extra safety. Ideally you would want to 
use an anti-static wrist band while removing and handling the diode. But don't worry too 
much about it if you don't have one. 


ii) Control Circuitl8 

Although it can technically be done, do not "direct drive". Direct driving involves 








hooking up a diode directly to a battery or other power source. This will usually kill your 
diode. Thus, you will need a circuit to regulate your power. 

18 http://showsvouhow.blogspot.com/2007/12/div-dvd-bumer-laserpointer-proner- 

way 18.html 



You will need the following parts: 

1) LM317T 

2) Switch (Any will work, I used a switch but a button works equally well) 

3) Potentiometer, 100 ohm (It can vary, but keep on track as much as 
possible) 

4) 10 ohm resistors (You need two of these) 

5) Board (PCB Boards work excellent for this) 





















6) Wire 

7) 47uf35v Capacitor 

8) 1N4001 Rectifier Diode 

9) 5/6 Volt Power Source 

You will also of course need more solder and your trusty soldering iron. 


Positive 



Now, let's first look at the laser diode itself. 

Align the pins as shown and identify each one. Place the LM317T face up 
on the table. The far-left pin needs to connect to the POSITIVE laser diode pin, but 
do not do the diode connection until last. Along the way it needs to connect to the 2 
Resistors, the Capacitor, and the Rectifier Diode. 

Lay your potentiometer face up with the pins facing you. The middle 
pin of the LM317T needs to connect to the far right AND middle pins of the 
potentiometer. Then, connect a wire from the left potentiometer pin too the other 
end of the two resistors. 

Connect the last (right) to the POSITIVE end of the batteries. Lastly, 
run a wire from the negative power end to the negative diode pin, connecting to 
the capacitor and rectifier diode along the way. 

Connect a Switch either on the main positive or negative rail. 

Is your circuit finished? Great! Now we need the 6 Volt power source. 

I used a Battery tray with 4 D batteries, but you can even use an old. 

Computer power supply if you want (although that may require extra 
modification). Pick up a Project Box (You know, the plastic black boxes with 



screws in the comers.) Make sure it is big enough to fit your entire Circuit. 

Connect the wires leading from the D Batteries to their respective 

positions. DO NOT PUT BATTERIES IN YET. This is just an added safety precaution, 

and I never have the batteries in my laser when it's not in use, even when off. 

Take the project box and drill two holes in the top: One for the 
potentiometer and one for the switch. Make sure they fit snugly. Insert the parts into the 
holes you drilled and screw them in with the parts it came with. You probably need a 
wrench for this. Make sure they are in tightly. 

Do not enclose it with a lid until you have verified it works (DO NOT 

turn it on.) It is at this point where you are most likely to ruin your diodes so BE 

CAREFUL. 

Take your soldering iron and solder the positive wire to the positive pin and the negative 
wire to the negative pin. Again, be careful: Too much heat will snap the pins. Also, do 
not short out the circuit against the base of the diode. Apply it as fast as possible without 
mshing so as to not weaken the pins. If you chose correctly and picked the red diode, you 
are done with the solder. If you chose the infrared, you will to remove it and place the red 
diode 

instead. And there is only one way to tell. Test it! Do you have Laser protection glasses? 
They need to be the kind that can resist the type of light the red diode is emitting (600- 
700 nm). This testing process is described in more detail below. 

SAFETY WARNING! 

1. If you do not use glasses, you are an idiot and should not be building a laser. 

These things BLIND you. How would you feel never seeing again, EVER? Wear 
protection glasses. 

2. NEVER stare directly into the laser diode. This could blind you even with the 
glasses on. 

Please go up and memorize the two safety steps. 

Now you will need a Laser Module. A company called AixiZ makes these, or you can 
just buy on eBay, whichever is cheaper. If you don't know, a module is a small shiny tube 
that holds the diode. It also contains a lens to focus the laser. They generally cost around 
$5. Once your module arrives, do not do anything with it. We have testing to do. Take 
your circuit connected to the diode along with the 4 D Batteries (Not in the tray). Go into 
a small, dark room (lock on the door is best so someone doesn't accidentally walk in and 
damage their eyes) and set up a piece of white paper against the wall. Make sure the 
switch is off. Put your goggles on and point the 

diode at the paper. Flip the switch. If you see a red glow on the paper, you are set! Of 
course, it will not bum anything yet, it isn't focused. If you see nothing, move the paper 
closer. If you see a faint white dot, turn it off! You did not choose wisely and rigged the 
Infrared. If this happens to you, remove the infrared diode and solder the other one into 
place. 

If you see nothing, nothing at all, it could be one of two things. It could just be the 
infrared, or it could be that your circuit is wired wrong. Double check everything. If you 
need too, use a Voltmeter to detect if your circuit is indeed running. 



Is your red diode glowing brightly? Excellent. Utilize the potentiometer at this point to 
fine-tune the system. Now, turn off the circuit and remove one or more batteries, just in 
case. You will need to obtain a vise and your module. Flip the back end of the diode and 
place the small hole over the diode so that the pins are sticking out. Place the other 
module section with the small hole over the pins. 

Push it together with the vise (keep it straight!) until the diode is snug inside the lens 
section of the module (the small end). Chop the wires comiecting your diode to the rest of 
your circuit in half and slip the wires through the small hole in the back of the module. 
Screw the module back together so that the wires are leading out of the hole. Now, solder 
the wires back to the circuit and wrap electrical tape around the soldered part. Make sure 
everything is ready. IT'S TIME!!! 

Replace your goggles and make sure that nobody will walk in and accidentally look at the 
laser. Put the D Batteries back in and flip the switch. If all went well you should have a 
laser! Now, turn the lens to focus the laser. Move the paper close and far to find the point 
where the point the laser makes is smallest. Place a match in that spot and it will bum. 19 



M 

\ i 

*' . 

— f 

V* <5*1 . 

Aft |* 


“ 11 * 



Above: an example laser system without casing 


19 Additional devices and EM based gadgets: https://divmaketech.blogsriot.com/2012 


3) Railgun (copper coil gun) 

I) The Theory 

A coil gun works on the principle of electromagnetic attraction. The coil gun itself is akin 
to an air cored solenoid. A ferromagnetic armature is placed at the breach of the coil and 
is electromagnetically attracted towards the center of the coil when a current is passed 
though the coil. When the armature reaches the center of the coil it will start actively 
decelerating if the current is still passing through the coil as it is magnetically attracted to 




the midpoint of the coil. This means that the current pulse length needs to be of a finite 
length in order for the armature to be accelerated up to the center of the coil and not 
‘sucked back’ as it tries to leave the coil via the other end. This is more specifically a 
‘reluctance coil gun’, a diagram is shown below. This is the biggest disadvantage to coil 
guns; the current pulse length needs to be controlled in order to cut the power when the 
armature reaches the middle of the coil. The second largest challenge to overcome with 
coil guns is delivering the electricity as quickly as possible. It stands to reason that the 
more energy you can put onto the coil gun, the more energy will be transferred into 
kinetic energy in the armature. 

The main losses in this system are the eddy currents in the flyway tube and the 
projectile/armature, these can be minimized by slotting the flyway tube or using a non- 
conductive material. The projectile must be ferromagnetic thus this means that limiting 
eddy currents cannot be achieved by using a non-conductive material. The best solution 
to this is to use a powdered Iron in epoxy resin matrix. Although this improves initial 
efficiency it also removes the ability for the gun to be operated as an ‘inductance coil 
gun’. 

2) Things to Consider When Designing 

i) Projectiles 

For further physics and test results regarding the projectiles please consult the following 
guide: 

https://www.instructables.com/id/Coil-Gun-Projectiles/ 

ii) Coil Length 

The longer the coil is the more time it has to drag the projectile to the center and the more 
wraps of wire can be fitted into the solenoid increasing magnetic flux density. The longer 
the piece of wire the coil is made of and the higher the inductance of the coil the higher 
the reluctance of the coil is so the longer the current pulse length will be. This means that 
the rate of change of current is lower and so will not reach as high a peak value. Since the 
current effects the magnetic field density a high current is desirable so the coil should be 
tuned so that it makes the strongest magnetic field in the time available. 

The coil length is directly linked to the projectile length as they should be roughly equal 
as mentioned previously. 

iii) Number of layers in the coil 

More layers mean a stronger magnetic field but it also means higher impedance and so a 
longer pulse length. If the pulse length is too long then the projectile will experience” 
suck back” and have a lower exit velocity, optical triggering can be used to solve this 
problem. 

Too many layers will mean that the magnetic field of the outer layers adds no strength the 
magnetic flux density in the center where the projectile is and so the energy is wasted. It 
also means that the pulse length is unnecessarily long so the current will not rise as 
sharply as otherwise possible. 



iv) Thickness of coil wire 

Thicker wire means lower impedance so a faster pulse length and higher peak current. 
This means less wraps in the coil per unit area, so the flux density is potentially reduced 
if the current isn't significantly increased by the lower 

impedance. If the wire is too thin it will have too high a resistance and get unnecessarily 
hot. In extreme cases it can bum out on firing. 

v) Pulse Length 

The pulse length should be exactly the same length as the amount of time it takes to pull 
the projectile from the breach to the center of the coil and return to zero. The pulse length 
is affected by a myriad of variables including, capacitor voltage, capacitor capacity, 
circuit resistance, and coil inductance which varies dynamically during use as there is 
initially an air core which is soon replaced with an iron core as the projectile slides in not 
to mention depending on how many turns, layers and what gauge of wire is used. This 
problem is solved by fixing as many variables as possible such as capacitor voltage and 
size, projectile dimensions which in turn fix the coil length and internal diameter. Then 
the remaining variables are varied until the optimal combination is found. The remaining 
variables are most importantly wire gauge and number of layers. Assuming a suitable 
switch can be used the wire gauge is usually the largest available. 

vi) Switch bounce/resistance 

Mechanical switches can arc and bounce which lengthens the pulse and lowers the 
average flux density experienced in the tube during firing. This is overcome by the use of 
solid-state switches such as SCR’s, MOSFET’s or IGBT's which experience none of the 
arcing issues. They are not perfect solutions though as they have several flaws such as 
requiring a switching current/voltage to work, and SCR's cannot be switched off until the 
source-drain current drops below zero so require “v-switching”. V-switching is where a 
second SCR and cap bank of the same or higher voltage is discharged through the first 
SCR dropping the voltage below zero and switching the switch off. 

MOSFET’s are generally quite low power so are of no use to coil guns of a decent scale 
and a suitable one can be expensive but a solution is to use a bank of them is parallel to 
spread the current over several less expensive devises. IGBT’s are much better solutions 
as they can be switched on and off at will and can handle far higher power than 
MOSFET’s. It is also important that the solid state switch can operate fast enough to turn 
the device on and off in the desired time frame, Most IGBT's are capable of this as well. 

vii) Capacitor Voltage 

The higher the capacitor voltage the higher the projectile velocity since the stored energy 
in a capacitor is equal to half the capacitance multiplied by the voltage squared as long as 
the switching capabilities are there then this is one of the more favorable variables to 
choose to increase as each extra volt makes a big difference. 

viii) Capacitor Capacitance 

The higher the capacitance the larger the volume of stored energy in line with: 



Energy stored in a capacitor=l/2 CV A 2 


4) Coil Flux Linkage (external Iron) 

Adding an external iron shell to the coil can improve the flux linkage between the coil 
and the projectile but care must be taken to eliminate Eddie current losses. A powdered 
iron matrix or ceramic ferrite is therefore the best option. The External iron must not have 
too much mass as the extra iron material will slow the magnetic flux build up and the coil 
gun may not saturate as not all of the ferrous material is magnetized which means it is 
dead weight and just slows the flux density increase rate. This would mean that the 
magnetic flux would not increase as rapidly and not reach as high peak value. Too little 
ferrous material means it is potentially wasting the magnetic flux available. The External 
iron must therefore he optimized so that it does not saturate and yet there is enough to 
enhance the magnetic flux density. It will affect the inductance of the coil and so the 
current pulse length so the coil may need to be of a slightly different shape to gain 
optimal performance, 

i) Minimize connecting wire length 

All connecting wires between the coil and the capacitors should be as short and thick as 
possible to reduce resistive losses and inductance. 

5) The Design 

i) Capacitor bank size 

A bank of 40 330v photoflash capacitors of lOOuF capacity where used giving a total 
energy capacity of 217.8J: 

E=l/2 CV A 2 

E=l/2*4000xl0 A (-6)*330 A 2 

E=217.8J 

ii) Switching 

Only solid state switches would work for this project as any other switches would arc. I 
was supplied with an IGBT capable of handling up to 1200V and 800A Peak and a 
maximum full switching on and off time of 1300ns. This is fast enough and can handle 
far more volts than needed but the current is only just enough. It 
switches at up to +/- 20v. 

iii) Charging 

A 1,5v to 400-volt inverter has been included in the enclosure to enable the device to be 
charged of AA batteries but this would be slow and would use several batteries per shot. 
The main charging comes from half rectified mains using a light bulb as a charging 
resistor to give non-linear resistance through the charge cycle. UK mains electricity is 
240v RMS, which when half wave rectified using a diode comes out at 336v. My 
capacitors charge up to 330 volts so 336 is perfect and mains will allow me to charge the 
bank cheaply and quickly when compared to the battery solution. A resistor was placed 
across the capacitor bank to slowly discharge it to make sure it is always left uncharged. 


iv) Voltage Monitoring 



A simple voltmeter has been mounted to the enclosure so that the voltage on the capacitor 
bank can be monitored in real time to check the charge state and double check prevention 
of overcharging 

v) Projectile dimensions 

Through trial and error and parameter sweeps I found the optimum set up for several 
different diameters of projectile. The important results are below; all were limited to 
roughly 800Amps so my IGBT could handle the current. 

6mm Diameter 

The standard 6mm coil gun with the predetermined limits from above would give a rough 
maximum of 33.5m/s and 3.6J kinetic energy on 15 layers of 14AWG 30mm length. The 
capacitor bank was so large this was evidently too much power to dump into such a small 
projectile in one stage. The projectile size was too small, and a larger projectile was 
needed. The simulation graph is below 

10mm Projectile 

Using a 10mm projectile it was found that a 40mm length coil would be best using 10 
layers of wire and producing 25.4m/s but a more reasonable 7.6J of kinetic energy. 

12mm Projectile 

Using a 12mm projectile an optimum length of 45mm was found with 9 layers of 
14AWG. This gave a velocity of 22.7m/s and a kinetic energy of 9.9J with a peak current 
of 811Amps. 

15mm Projectile 

Using a 15mm projectile an optimum set up was found to be 7 layers of 50mm length 
14AWG. This gave a velocity of 16.65m/s and a kinetic energy of 9.15J. This was less 
than the 12mm so the 12mm was used. 



Picture above are examples of ammunition used with the coil gun. 

More details can be found at: https://www.instructables.com/id/Coil-Gun-Projectiles/ 








4) Heart attack gun (with optional umbrella enclosure) 

This gun is used for stealthy assassination missions. It shoots a poison pellet or other 
poison contained within a projectile. It is also called the „Bulgarian Umbrella A 
Bulgarian umbrella is an umbrella with a hidden pneumatic mechanism which injects a 
small poisonous pellet containing ricin. It has a hollowed stalk into which the pellet 
neatly sits. 



This is a basic schematic thereof: 

This is a diagram of the firing mechanism of the umbrella used to assassinate Bulgarian 
dissident Georgi Markov. The bigger is in the umbrella handle, the umbrella handle 
pushes a spring which pushes the linkage system. The 

linkage system links the trigger to the valve of the Cylinder of compressed air. The 
switch then activates the valve. The valve fires the ricin (or other poison) pellet through 
the 'barrel' of the umbrella. 

Learning from Past Failures (1980's) using this Tactic 

„The plot was described by Trevor Floyd, a member of the innocuously-named 
Civil Co-operation Bureau (CCB), a <South African> defense force hit-squad. 

The targets were Dr. Pallo Jordan, an MP and a former minister in Nelson Mandela's 
Cabinet, and South Africa's Minister of Water Affairs and Forestry, Ronnie Kasrils. And 
the proposed murder weapon was an umbrella. 

Mr. Floyd told the court that, having read of a similar ploy used by Bulgarian assassins to 
kill the dissident BBC World Service journalist Georgi Markov, he decided to use an 
umbrella to fire darts laced with poison. Having been 

given the go-ahead by his boss, CCB's "managing director", Colonel Joe Verster, he duly 
acquired an umbrella from Europe, presumably to prevent the killer being traced to South 
Africa. Mr. Floyd, a self-confessed State killer, said he was instructed to fly to London, 
where he would be given the umbrella after its transformation. He duly linked up in 
Britain with a man who had identified himself as Jan Lourens, a Special Forces agent, 
and who was to supply him with the umbrella. 

They drove to a farm that Mr. Lourens said was used by people including Dr. 
Basson while they were in England. 

Mr. Floyd told Mr. Justice Hartzenberg: "He went into the house and brought the gadget 
out. When you pressed it against skin, the spikes shot into the body and, if filled with the 






poison substance, they could be deadly." It was then that the assassination bid started 
coming off the rails. As Mr. 

Lourens demonstrated how to use the umbrella, some of the poison spilled onto his 
finger. Mr. Floyd said: "I thought he was going to die. I told him to drink milk and to lie 
down for a while because I did not know the area and I would not be able to rush him to 
hospital." But Mr. Lourens felt fine after about 10 minutes. Armed with his umbrella, Mr. 
Floyd set off back to London. He soon found he had another problem - the killing 
attachment made the umbrella too long and there was a real danger of the tip 
accidentally hitting the ground and dispensing its poison spikes prematurely. So, he 
carried out his own modification, attaching the gadget to the umbrella with a "hair¬ 
curling tongs". 

Now Mr. Floyd was armed and in place. But the intended victims were not. Dr Jordan 
had moved, and Mr. Kasrils was not often "at his place". The plot was abandoned, and 
the umbrella thrown into the Thames. "20 We can identify multiple points of failure 
which the SS member must avoid: 

1) The agent was ferried to a safe house which was in continuous use. Should he have 
had a tail then the safe house would be compromised. 

2) A demonstration was bungled leading to the accidental poisoning of a team member. 

3) The weapon was poorly designed and made in a hurried manner without prior testing. 

4) The attempts to repair it in the field were poor and would have resulted in the 
identity of the assassin being compromised due to the incredibly obvious nature of the 
modification. 

5) The weapon was not properly disposed of. Throwing it away into nearby nature is 
stupid, especially in a large city where such an action would attract attention. Clearly the 
agent was acting in frustration and not planning ahead. The SS member is recommended 
to develop or utilize further designs in consultation with SS weaponry experts. A pretty, 
but ineffective and overly costly weapon is damaging to the overall war effort. It is much 
more efficient to mass produce simpler designs for your formation than spend months on 
a single prototype. The goal and usage of the weapons is to be considered: are they the 
correct tool for the job? 

20 https://www.independent.co.uk/news/world/africa/how-an-assassin-bungleda-deadly- 
umbrella-plot-276370.html 


II. Home-made explosives 

In a perfect world the National Socialist would not need to manufacture bombs at home, 
however a perfect world must be forged through our Iron and Blood, which starts in the 
household. 

1) Bomb making intro 
Contents 

1) Applied Chemistry 

2) Bomb fuels 

a) ROCKET ENGINE POWDER 



b) RIFLE/SHOTGUN POWDER 

c) FLASH POWDER 
3) See also 

1) Applied Chemistry 

Bomb making is a topic many darknet people are very interested in, because with little 
effort and money some impressive devices can be made. 

2) Bomb fuels 

a) ROCKET ENGINE POWDER 

One of the most exciting hobbies nowadays is model rocketry. Estes is the largest 
producer of model rocket kits and engines. Rocket engines are composed of a single large 
grain of propellant. This grain is surrounded by a fairly heavy cardboard tubing. One gets 
the propellant by slitting the tube lengthwise and unwrapping it like a paper towel roll. 
When this is done, the grey fire clay at either 

end of the propellant grain must be removed. This is usually done gently with a plastic or 
brass knife. The material is exceptionally hard and must be crushed to be used. By 
gripping the grain on the widest setting on a set of pliers and putting the grain and 
powder in a plastic bag, the powder will not break apart and shatter all over. This should 
be done to all the large chunks of powder, and then it should be crushed like black 
powder. Rocket engines come in various sizes, ranging from 1/4 A - 2T to the incredibly 
powerful D engines. The larger the engine, the more expensive. D engines come in 
packages of three, and cost about $5.00 per package. Rocket engines are perhaps the 
single most useful item sold in stores to a terrorist, since they can be used as is, or can be 
cannibalized for their explosive powder. 

b) RIFLE/SHOTGUN POWDER 

Rifle powder and shotgun powder are really the same from a practical standpoint. They 
are both nitrocellulose-based propellants. They will be referred to as gunpowder in all 
future references. Gunpowder is made by the action of 

concentrated nitric and sulfuric acid upon cotton. This material is then dissolved by 
solvents and then reformed in the desired grain size. When dealing with gunpowder, the 
grain size is not nearly as important as that of black powder. Both large and small grained 
gunpowder bum fairly slowly compared to black powder when unconfined, but when it is 
confined, gunpowder bums both hotter and with more gaseous expansion, producing 
more pressure. Therefore, the grinding process that is often necessary for other 
propellants is not necessary for gunpowder. Gunpowder costs about $9.00 per pound. 

c) FLASH POWDER 

Flash powder is a mixture of powdered zirconium metal and various oxidizers. It is 
extremely sensitive to heat or sparks and should be treated with more care than black 
powder, with which it should NEVER be mixed. It is sold in small containers which must 
be mixed and shaken before use. It is very finely powdered, and is available in three 
speeds: fast, medium, and slow. The fast flash powder is the best for using in explosives 
or detonators.21 



21 See also: http://qx7j2selmom4ioxf.onion/files.html#new 
http://parazite.nn.fi/roKuesci/index.php/f-18.html 


3) Pipe bomb/molotov etc. 

i) EXPLOSIVE CONTAINERS 

This section will cover everything from making a simple firecracker to a complicated 
scheme for detonating an insensitive high explosive, both of which are methods that 
could be utilized by freedom fighters. 

ii) PAPER CONTAINERS 

Paper was the first container ever used for explosives, since it was first used by the 
Chinese to make fireworks. Paper containers are usually very simple to make and are 
certainly the cheapest. There are many possible uses for paper in containing explosives, 
and the two most obvious are in firecrackers and rocket engines. Simply by rolling up a 
long sheet of paper, and gluing it together, one can make a simple rocket engine. Perhaps 
a more interesting and dangerous use is in the firecracker. The firecracker shown here is 
one of Mexican design. It is called a "polumna", meaning "dove". The process of their 
manufacture is not unlike that of making a paper football. If one takes a sheet of paper 
about 16 inches in length by 1.5 inches wide, and fold one comer so that it looks like this: 



and then fold it again so that it looks like this: 


J —I 


A pocket is formed. This pocket can be filled with black powder, pyrodex, flash powder, 
gunpowder, rocket engine powder, or any of the quick-burning fuel oxidizer mixtures that occur 
in the form of a fine powder. A fuse is then 

inserted, and one continues the triangular folds, being careful not to spill out any of the 
explosive. When the polumna is finished, it should be taped together very tightly, since this will 
increase the strength of the container, and produce a louder and more powerful explosion when it 








is lit. The finished polumna should look like a 1/4 inch - 1/3-inch-thick triangle, like the one 
shown below: 


*ecufdy tape all comm 


line 


iii) METAL CONTAINERS 

The classic pipe bomb is the best-known example of a metal-contained explosive. 

Idiot anarchists take white tipped matches and cut off the matchheads. They pound one end of a 
pipe closed with a hammer, pour in the white tipped matches, and then pound the other end 
closed. This process often kills the fool, since when he pounds the pipe closed, he could very 
easily cause enough friction between the match heads to cause them to ignite and explode the 
unfinished bomb. By using pipe caps, the process is somewhat safer, and the less stupid anarchist 
would never use white tipped matches in a bomb. He would buy two pipe caps and threaded pipe 
(fig. 1). First, he would drill a hole in one pipe cap, and put a fuse in it so that it will not come 
out, and so powder will not escape during handling. The fuse would be at least 3/4 an inch long 
inside the bomb. He would then screw the cap with the fuse in it on tightly, possibly putting a 
drop of super glue on it to hold it tight. He would then pour his explosive powder in the bomb. 

To pack it tightly, he would take a large wad of tissue paper and, after filling the pipe to the very 
top, pack the powder down, by using the paper as a ramrod tip, and pushing it with a pencil or 
other wide ended object, until it would not move any further. Finally, he would screw the other 
pipe cap on, and glue it. The tissue paper would help prevent some of the powder from being 
caught in the threads of the pipe or pipe cap from being crushed and subject to friction, which 
might ignite the powder, causing an explosion during manufacture. 

(An assembled bomb is presented in fig. 2.) 





|*vwv| 


_ 

| |aaaaa| vnm_vww% 



fig I Threaded ptpe and cndca^M 


lt»suc--U 

:: - |— low order nfitohe- 

paper |^ fuse 


endcap pipe emkap 

m beie 

fig. 2 .Wmbkd pipe boo* 


This is one possible design that a mad bomber would use. If, however, he did not have access to 
threaded pipe with endcaps, he could always use a piece of copper or aluminum pipe, since it is 
easily bent into a suitable position. A major 

problem with copper piping, however, is bending and folding it without tearing it; if too much 
force is used when folding and bending copper pipe, it will split along the fold. The safest 
method for making a pipe bomb out of copper or aluminum pipe is similar to the method with 
pipe and endcaps. 


First, one flattens one end of a copper or aluminum pipe carefully, making sure not to tear or rip 
the piping. Then, the flat end of the pipe should be folded over at least once, if this does not rip 
the pipe. A fuse hole should be drilled in the pipe near the now closed end, and the fuse should 
be inserted. Next, the bomb-builder would fill the bomb with a low order explosive, and pack it 
with a large wad of tissue paper. He would then flatten and fold the other end of the 
pipe with a pair of pliers. If he was not too dumb, he would do this slowly, since the process of 
folding and bending metal gives off heat, which could set off the explosive. A diagram is 
presented below: A C02 cartridge from a B.B gun is another excellent container for a low-order 
explosive. It has one minor disadvantage: it is time consuming to fill. But this can be rectified by 
widening the opening of the cartridge with a pointed tool. Then, all that would have to be 










done is to fill the C02 cartridge with any low-order explosive, or 
any of the fast burning fuel oxidizer mixtures and insert a fuse. 

These devices are commonly called "crater makers". A C02 cartridge 

fig. I pipe with mk end lladcacd and (ix bote drilled (tap view I 


fig 2 pipe witkone end fanewed md I n M o d tyl tap view) 


fig .1 pipe with Itomwl f olded nd lude view) 

_toe 


1 i— 1 “ h ‘‘“ 

. 1 

_W<r- 

• - low tnki explosive -_| 


fig 4 completed bomb, dinwing ttswac paper packing and explosive 
(side view I 

also works well as a container for a thermite incendiary device, but it must be modified. The 
opening in the end must be widened, so that the ignition mixture, such as powdered magnesium, 
does not explode. The fuse will ignite the powdered magnesium, which, in turn, would ignite the 
thermite. 

The previously mentioned designs for explosive devices are fine for low order explosives, but 
are unsuitable for high-order explosives, since the latter requires a shockwave to be detonated. A 
design employing a smaller low-order explosive device inside a larger device containing a high- 
order explosive would 







_I_ I 


ItlfhnfiMAt 


hw (ipkwu - 


probably be used. It would look something like: 

If the large high explosive container is small, such as a C02 cartridge, then a segment of a 
hollow radio antenna can be made into a low-order pipe bomb, which can be fitted with a fuse, 
and inserted into the C02 cartridge. 

iv) PLASTIC CONTAINERS 

Plastic containers are perhaps the best containers for explosives, since they can be any size or 
shape, and are not fragile like glass. Plastic piping can be bought at hardware or plumbing stores, 
and a device much like the ones used for 

metal containers can be made. The high-order version works well with plastic piping. 

If the entire device is made out of plastic, it is not detectable by metal detectors. Plastic 
containers can usually be shaped by heating the container and bending it at the appropriate place. 
They can be glued closed with epoxy or other 

cement for plastics. Epoxy alone can be used as an endcap, if a wad of tissue paper 















II 

1 

_ /« 

II 

epoxy || 


1 

|| (issue || 
j| paper || 

II_II 


!** explosive **| 


• •*•»•••*•*-fuse 

II.*11 

||AAAAAAAAAAAAAAA|| 

n 

I! tissue || 

II paper || 


g 

epoxy || 

_II 

II 


is placed in the piping. Epoxy with a drying agent works best in this type of device. One end 
must be made first and be allowed to dry completely before the device can be filled with powder 
and fused. Then, with another piece of tissue paper, pack the powder tightly, and cover it with 
plenty of epoxy. PVC pipe works well for this type of device, but it cannot be used if the pipe 
had an inside diameter greater than 3/4 of an inch. Other plastic putties can be used in this type 
of device, but epoxy with a drying agent works best. 


v) ADVANCED USES FOR EXPLOSIVES 

The techniques presented here are those that could be used by a person who had some degree of 
knowledge of the use of explosives. Some of this information comes from demolitions books, or 
from military handbooks. Advanced uses for explosives usually involved shaped charges or 
utilize a minimum amount of explosive to do a maximum amount of damage. They almost 
always involve high order explosives. 


vi) SHAPED CHARGES 

A shaped charge is an explosive device that, upon detonation, directs the explosive force of 
detonation at a small target area. This process can be used to breach the strongest armor, since 
forces of literally millions of pounds of pressure 

per square inch can be generated. Shaped charges employ high-order explosives, and usually 










electric ignition systems. 

An example of a shaped charge is shown below. 


wire_ _• wire 


I I II 

\ igniter / 11 

\_/ II 

priming charge 
(mercury fulminate) 


8 inches high 11 / 

II / high \ || 

11 / explosive \ 11 
11 / charge \ 11 



|<—— 8 inches 


vii) TUBE EXPLOSIVES 

A variation on shaped charges, tube explosives can be used in ways that shaped charges cannot. 
If a piece of 1/2 inch plastic tubing was filled with a sensitive high explosive such as R.D.X. and 
prepared as the plastic explosive container in section iv), a different sort of shaped charge could 
be produced; a charge that directs explosive force in a circular manner. This type of explosive 
could be wrapped around a column, or a doorknob, or a telephone pole. The explosion would be 
directed in and out, and most likely destroy whatever it was wrapped around. In an unbent state, 
a tube explosive would look like this: 

When an assassin or terrorist wishes to use a tube bomb, he must wrap it around whatever thing 
he wishes to destroy and epoxy the ends of the tube bomb together. After it dries, he/she can 








connect wires to the squib wires, and detonate the bomb, with any method of electric detonation. 


qx>*yl 



tissue | 
II paper! 


RDX | 



—II 

-II 

II Ik 1 

lllql 

II 

II1 u 

II 

b 

II 

II1 b| 

II 

III 

II 


I [tissue! 

II paper' 


epoxy| 

H | 

/ II Nl 

fl_♦ wire_ 


viii) MOLOTOV COCKTAILS 

First used by Russians against German tanks, the Molotov cocktail is now exclusively used by 

































terrorists worldwide. They are extremely simple to make and can produce devastating results. By 
taking any highly flammable material, such as gasoline, diesel fuel, kerosene, ethyl or methyl 
alcohol, lighter fluid, turpentine, or any mixture of the above, and putting it into a large glass 
bottle, anyone can make an effective firebomb. After putting the flammable liquid in the bottle, 
simply put a piece of cloth that is soaked in the liquid in the top of the bottle so that it fits tightly. 
Then, wrap some of the cloth around the neck and tie it, but be sure to leave a few inches of lose 
cloth to light. Light the exposed cloth and throw the bottle. If the burning cloth does not go out, 
and if the bottle breaks on impact, the contents of the bottle will spatter over a large area near the 
site of impact and burst into flame. Flammable mixtures such as kerosene and motor oil should 
be mixed with a more volatile and flammable liquid, such as gasoline, to insure ignition. A 
mixture such as tar or grease and gasoline will stick to the surface that it strikes, and bum hotter, 
and be more difficult to extinguish. A mixture such as this must be shaken well before it is lit and 
thrown. 

Special care must be taken to maintain good will and support of the local populace. 
Remember: the term terrorist should be reserved for Leftists. We are freedom fighters. 

Further designs can be found in the ..Terrorist's Flandbook “by Gunzenbomz PyroTechnologies, 
a division of Chaos Industries (CF1AOS) 

4) Swiss army knife blueprint 

No modem fighter is complete without a Swiss Army Knife, also referred to as a Multitool. It is 
recommended to acquire a Victorinox Spartan or Deluxe Tinker. In lieu of these a simple guide 
for DIY constmction of your own Swiss Army Knife (different attachments approximated as 
keys) is included below, the SS member is recommended to creatively work around resource 
limitations relating to tools and materials: 

i) Materials 

1) Two pieces of wood (about 1" x 3.75" x 1/8" each) 

2) Thin sheet metal (about 2" x 3.75") 

3) Two #8 machine screw lock nuts 

4) Two #8 machine screws, 3/4" long 

5) Ten #8 machine screw washers 

6) Glue that's able to bond wood to metal 

7) Wood stain (optional) 

8) Polyurethane (optional) 




ii) Tools 

1) Drill and bit set 

2) Tin snips 

3) Sand paper/sanding block 

4) Small binder clamps 

5) Pencil 

6) Ruler 

Tip: Paint stir sticks are a good size to be used for the wood pieces. These are generally free at 
the paint section of most hardware stores. For the sheet metal, I used a baking sheet that I found 
at Dollar Tree for $1. This yields about 13" x 9" of metal. 

iii) Cut the Wood and Metal to Shape 

Use whatever rounded object you have readily available to trace a semicircle onto each end of 
the wood pieces. Then using a saw or knife, cut along the outline. Trace the shape of these wood 
pieces onto the sheet metal. 

Using a pair of tin snips 




cut out two pieces of sheet metal that are a little smaller than the outlines. 


iv) Drill the Bolt Holes 

Make a stack of the two wood pieces and the two metal pieces. Make sure all the pieces are 
centered and hold them together with a binder clamp. Mark the centers of the semicircle on each 
end. They should be about 2.75 inches apart. Using a 3/16 drill bit, drill through all four layers at 
one of these points. Insert a screw into this hole to help keep the layers lined up. Then drill the 
second hole. Remove the two metal pieces and re-drill the holes in the wood pieces so that the 
holes are wide enough to accommodate the head of the machine screw and the lock nut 
respective. You may wish to wrap the wood pieces in tape to prevent them from splitting when 
drilling larger holes. When you're done cutting and drilling, sand all 









the surfaces and edges smooth. 


v) Assemble the Frame 

Insert the machine screws through the holes in the metal plates. Then add the washers and keys. 
Four keys and five washers will fit perfectly on a 3/4-inch screw in the sequence (sheet metal, 
washer, key, washer, key, washer, key, washer, key, washer, sheet metal). Using this sequence, 
two keys and three washers will fit on a 1/2-inch screw. Likewise, six keys and seven washers 
will fit on a 1 -inch screw. 




Alternatively, you can conserve space a little bit by eliminating the washers, but the keys will 
tend to stick on each other. If you have an odd number of keys you can fill the space with two 
washers. When you're done adding keys and washers, add the second piece of sheet metal. Then, 
tighten everything together with the two lock nuts. 



vi) Glue the Wooden Panels 

Apply a thin layer of glue to the outside of one plate and press on the wooden panel. Do the same 
for the second panel, then use binder clips to hold everything in place while the glue dries. You 
may wish to add a layer or two of card stock to prevent the clamps from denting your wood 
panels. Victorinox Spartan. Victorinox Deluxe Tinker. 


Appendix C: Enemy Tactics and Guerrilla War 
I. War Tactics of the Enemy 

This section was based on the Brazilian22-communist war tactics which saw success in the 70's. 
Clear differences and yet large similarities are apparent. The largest difference occurs in the war 
philosophy of each individual fighter, or rather the lack thereof, especially from the ethical and 
leadership perspective, of the leftists. 

On the other hand it is helpful to learn the bulk of these tactics off by-heart in order to improve 
your own war effort and to encircle, lure and destroy the enemy in the field. 

I. Mini-Manual of the Urban Guerrilla by Carlos Marighella 
Contents23 

1) A DEFINITION OF THE URBAN GUERRILLA 

2) PERSONAL QUALITIES OF THE URBAN GUERRILLA 

3) HOW THE URBAN GUERRILLA LIVES 

4) TECHNICAL PREPARATION OF THE URBAN GUERRILLA 

5) THE URBAN GUERRILLA'S WEAPONS 

6) THE SHOT; THE URBAN GUERRILLA'S REASON FOR EXISTENCE 



7) THE FIRING GROUP 

8) THE LOGISTICS OF THE URBAN GUERRILLA 

9) CHARACTERISTICS OF THE URBAN GUERRILLA'S TACTICS 

10) THE INITIAL ADVANTAGES OF THE URBAN GUERRILLA 

11) SURPRISE 

12) KNOWLEDGE OF THE TERRAIN 

13) MOBILITY AND SPEED 

14) INFORMATION 

15) DECISIVENESS 

16) OBJECTIVES OF THE GUERRILLA'S ACTIONS 

17) ON THE TYPES AND NATURE OF MISSIONS FOR THE URBAN 
GUERRILLA 

18) ASSAULTS 

19) THE BANK ASSAULT AS POPULAR MISSION 

20) RAIDS AND PENETRATIONS 

21) OCCUPATIONS 

22 Tactics are adapted to the Brazil's environment - this must be considered. 


23 See also: http://kpvz7ki21zvnwve7.onion/wiki/index.php/Main Page 


22) AMBUSH 

23) STREET TACTICS 

24) STRIKES AND WORK INTERRUPTIONS 

25) DESERTIONS, DIVERSIONS, SEIZURES, EXPROPRIATION OF 
AMMUNITION AND EXPLOSIVES 

26) LIBERATION OF PRISONERS 

27) EXECUTIONS 

28) KIDNAPPING 

29) SABOTAGE 

30) TERRORISM 

31) ARMED PROPAGANDA 

32) THE WAR OF NERVES 

33) HOW TO CARRY OUT THE ACTION 

34) SOME OBSERVATIONS ON TACTICS 

35) RESCUE OF THE WOUNDED 

36) GUERRILLA SECURITY 

37) THE SEVEN SINS OF THE URBAN GUERRILLA 

38) POPULAR SUPPORT 

39) See also 

1) A DEFINITION OF THE URBAN GUERRILLA 

The urban guerrilla is a person who fights the military dictatorship with weapons, using 
unconventional methods. A revolutionary and an ardent patriot, he is a fighter for his country's 



liberation, a friend of the people and of freedom. The area in which the urban guerrilla operates 
is in the large Brazilian cities. There are also criminals or outlaws who work in the big cities. 
Many times, actions by criminals are taken to be actions by urban guerrillas. The urban guerrilla, 
however, differs radically from the criminal. The criminal benefits personally from his actions, 
and attacks indiscriminately without distinguishing between the exploiters and the exploited, 
which is why there are so many ordinary people among his victims. The urban guerrilla follows a 
political goal, and only attacks the government, the big businesses and the foreign imperialists. 
Another element just as harmful to the guerrillas as the criminal, and also operating in the urban 
area, is the counterrevolutionary, who creates confusion, robs banks, throws bombs, kidnaps, 
assassinates, and commits the worst crimes imaginable against urban guerrillas, revolutionary 
priests, students, and citizens who oppose tyranny and seek liberty. The urban guerrilla is an 
implacable enemy of the regime, and systematically inflicts damage on the authorities and on the 
people who dominate the country and exercise power. The primary task of the urban guerrilla is 
to distract, to wear down, to demoralize the military regime and its repressive forces, and also to 
attack and destroy the wealth and property of the foreign managers and the Brazilian upper class. 
The urban guerrilla is not afraid to dismantle and destroy the present Brazilian economic, 
political and social system, for his aim is to aid the rural guerrillas and to help in the creation of a 
totally new and revolutionary social and political structure, with the armed population in power. 

2) PERSONAL QUALITIES OP THE URBAN GUERRILLA 

The urban guerrilla is characterized by his bravery and his decisive nature. He must be a good 
tactician, and a good marksman. The urban guerrilla must be a person of great cleverness to 
compensate for the fact that he is not sufficiently 

strong in weapons, ammunition and equipment. The career military officers and the government 
police have modem weapons and transport, and can go about anywhere freely, using the force of 
their own strength. The urban guerrilla does not have such resources at his disposal and leads a 
clandestine existence. The guerrilla may be a convicted person or one who is out on parole and 
must then use false documents. Nevertheless, the urban guerrilla has an advantage over the 
conventional military or the police. It is that, while the military and the police act on behalf of 
the enemy, whom the people hate, the urban guerrilla defends a just cause, which is the people's 
cause. The urban guerrilla's weapons are inferior to the enemy's, but from the moral point of 
view, the urban guerrilla has an undeniable superiority. This moral superiority is what sustains 
the urban guerrilla. Thanks to it, the urban guerrilla can accomplish his principle duty, which is 
to attack and survive. The urban guerrilla has to capture or steal weapons from the enemy to be 
able to fight. Because his weapons are not uniform—since what he has are expropriated or have 
fallen into his hands in various ways—the urban guerrilla faces the problem of a variety of 
weapons and a shortage of ammunition. Moreover, he has no place in which to practice shooting 
and marksmanship. These difficulties have to be overcome, forcing the urban guerrillas to be 
imaginative and creative— qualities without which it would be impossible for him to carry out 
his role as a revolutionary. The urban guerrilla must possess initiative, mobility and flexibility, as 
well as versatility and a command of any situation. Initiative especially is an indispensable 
quality. It is not always possible to foresee everything, and the urban guerrilla cannot let himself 
become confused or wait for instructions. His duty is to act, to find adequate solutions for each 



problem he faces, and to retreat. It is better to err acting than to do nothing for fear of making a 
mistake. Without initiative, there is no urban guerrilla warfare. Other important qualities in the 
urban guerrilla are the following: to be a good walker, to be able to stand up against fatigue, 
hunger, rain or heat. To know how to hide, and how to be vigilant. To conquer the art of 
dissembling. Never to fear danger. To behave the same by day as by night. Not to act 
impetuously. To have unlimited patience. To remain calm and cool in the worst of conditions 
and situations. Never to leave a track or trail. Not to get discouraged. In the face of the almost 
insurmountable difficulties in urban guerrilla warfare, sometimes comrades weaken and give up 
the fight. The urban guerrilla is not a businessman in an urban company, nor is he an actor in a 
play. Urban guerrilla warfare, like rural guerrilla warfare, is a pledge which the guerrilla makes 
to himself. When he can no longer face the difficulties, or if he knows that he lacks the patience 
to wait, then it is better for him to relinquish his role before he betrays his pledge, for he clearly 
lacks the basic qualities necessary to be a guerrilla. 

3) HOW THE URBAN GUERRILLA LIVES 

The urban guerrilla must know how to live among the people, and he must be careful not to 
appear strange and different from ordinary city life. He should not wear clothes that are different 
from those that other people wear. Elaborate and high-fashion clothing for men or women may 
often be a handicap if the urban guerrilla's mission takes him into working class neighborhoods, 
or sections where such dress is uncommon. The same care has to be taken if the urban guerrilla 
must move from the South of the country to the North, and vice versa. The urban guerrilla must 
make his living through his job or his professional activity. If he is known and sought by the 
police, he must go underground, and sometimes must live hidden. Under such circumstances, the 
urban guerrilla cannot reveal his activity to anyone, since this information is always and only the 
responsibility of the revolutionary organization in which he is participating. 

The urban guerrilla must have a great ability for observation. He must be well-informed about 
everything, particularly about the enemy's movements, and he must be very inquisitive and 
knowledgeable about the area in which he lives, 

operates, or travels through. But the fundamental characteristic of the urban guerrilla is that he is 
a man who fights with weapons; given these circumstances, there is very little likelihood that he 
will be able to follow his normal profession for long without being identified by the police. The 
role of expropriation thus looms as clear as high noon. It is impossible for the urban guerrilla to 
exist and survive without fighting to expropriate. Thus, the armed struggle of the urban guerrilla 
points towards two essential objectives: 

1) the physical elimination of the leaders and assistants of the anned forces and of the police; 

2) the expropriation of government resources and the wealth belonging to the rich 
businessmen24, the large landowners and the imperialists, with small expropriations used for the 
sustenance of the individual 

24 Here we see already the absence of Sabbatean-Frankist Jewish humanity, no difference is 
made between the rich who were bom poor and built their fortune and those who parasitically 
exploited the working class. 



guerrillas and large ones for the maintenance of the revolutionary organization itself. It is clear 
that the armed struggle of the urban guerrilla also has other objectives. But here we are referring 
to the two basic objectives, above all expropriation. It is necessary for every urban guerrilla to 
always keep in mind that he can only maintain his existence if he is able to kill the police and 
those dedicated to repression, and if he is determined—truly determined—to expropriate the 
wealth of the rich businessmen, landowners and imperialists. One of the fundamental 
characteristics of the Brazilian revolution is that, from the beginning, it developed around the 
expropriation of the wealth of the 

major business, imperialist and landowning interests, without excluding the largest and most 
powerful commercial elements engaged in the import-export business. And by expropriating the 
wealth of the principle enemies of the people, 

the Brazilian revolution was able to hit them at their vital center, with preferential and systematic 
attacks on the banking network—that is to say, the most telling blows were levelled at the 
businessman's nerve system. The bank robberies carried out by the Brazilian urban guerrillas 
hurt big businesses and others, the foreign companies which insure and re-insure the banking 
capital, the imperialist companies, the federal and state governments—all of them are 
systematically expropriated as of now. The fruit of these expropriations has been devoted to the 
tasks of learning and perfecting urban guerrilla techniques, the purchase, production and 
transportation of weapons and ammunition for the rural areas, the security precautions of the 
guerrillas, the daily maintenance of the fighters, those who have been liberated from prison by 
armed force, those who have been wounded, and those who are being persecuted by the police, 
and to any kind of problem concerning comrades liberated from jail or assassinated by the police 
and the military dictatorship. The tremendous costs of the revolutionary war must fall upon the 
big businesses, on the imperialists, on the large landowners, and on the government too—both 
federal and state—since they are all exploiters and oppressors of the people. Men of the 
government, agents of the dictatorship and of foreign imperialism, especially, must pay with 
their lives for the crimes they have committed against the Brazilian people. In Brazil, the number 
of violent actions carried out by urban guerrillas, including executions, explosions, seizures of 
weapons, ammunition and explosives, assaults on banks and prisons, etc., is significant enough 
to leave no room for doubt as to the actual aims of the revolutionaries; all are witnesses to the 
fact that we are in a full revolutionary war and that this war can be waged only by violent means. 
This is the reason why the urban guerrilla uses armed struggle, and why he continues to 
concentrate his efforts on the physical extermination of the agents of repression, and to dedicate 
24 hours a day to expropriations from the people's 
exploiters. 


4) TECHNICAL PREPARATION OF THE URBAN GUERRILLA 

No one can become an urban guerrilla without paying special attention to technical preparation. 
The technical preparation of the urban guerrilla runs from a concern for his physical condition to 
a knowledge of and apprenticeship in professions and skills of all kinds, particularly manual 
skills. The urban guerrilla can have a strong physical constitution only if he trains systematically. 
He cannot be a good fighter if he has not learned the art of fighting. For that reason, the urban 



guerrilla must learn and practice the various forms of unarmed fighting, of attack, and of 
personal defense. Other useful forms of physical preparation are hiking, camping, the practice of 
survival in the woods, mountain climbing, rowing, swimming, skin diving and training as a 
frogman, fishing, harpooning, and the hunting of birds and of small and big game, ft is very 
important to learn how to drive a car, pilot a plane, handle a motor boat and a sailboat, 
understand mechanics, radio, telephone, electricity and have some knowledge of electronics 
techniques 25. 

It is also important to have a knowledge of topographical information, to be able to determine 
one's position by instruments or other available resources, to calculate distances, make maps and 
plans, draw to scale, make timings, and work with an angle protractor, a compass, etc. A 
knowledge of chemistry, of color combination and of stamp-making, the mastery of the skills of 
calligraphy and the copying of letters, and other techniques are part of the technical preparation 
of the urban guerrilla, who is obliged to falsify documents in order to live within a society that he 
seeks to destroy. In the area of "makeshift" medicine, the urban guerrilla has the special role of 
being a doctor or understanding medicine, nursing, pharmacology, drugs, basic surgery and 
emergency first aid. The basic question in the technical preparation of the urban guerrilla is, 
nevertheless, to know how to handle weapons such as the submachine gun, revolver, automatic 
pistol, FAL, various types of shotguns, carbines, mortars, bazookas, etc. A knowledge of various 
types of ammunition and explosives is another aspect to consider. Among the explosives, 
dynamite must be well understood. The use of incendiary bombs, smoke bombs, and other types 
is also indispensable prior training. To know how to improvise and repair weapons, prepare 
Molotov cocktails, grenades, mines, homemade destructive devices, how-to blow-up bridges, 
tear up and put out of service railroads and railroad cars, these are necessities in the technical 
preparation of the urban guerrilla that can never be considered unimportant. 25 Note here that the 
enemy rarely follows this advice, preferring to engage in carnal pleasures and merely learning a 
singular role to a good degree. The list of skills mentioned is recommended as you have the 
willpower and strength to better yourself as compared to their slovenliness. That being said, 
NEVER underestimate your enemy. The highest level of preparation for the urban guerrilla is 
the training camp for technical training. But only the guerrilla who has already passed a 
preliminary examination can go to this school—that is to say, one who has passed the test of fire 
in revolutionary action, in actual combat against the enemy. 

5) THE URBAN GUERRILLA'S WEAPONS 

The urban guerrilla's weapons are light arms, easily obtained, usually captured from the enemy, 
purchased, or made on the spot. Light weapons have the advantage of fast handling and easy 
transport. In general, light weapons are 

characterized as being short-barreled. This includes many automatic weapons. Automatic and 
semi-automatic weapons considerably increase the firepower of the urban guerrilla. The 
disadvantage of this type of weapon, for us, is the difficulty in controlling it, resulting in wasted 
rounds or a wasteful use of ammunition—corrected for only by a good aim and precision firing. 
Men who are poorly trained convert automatic weapons into an ammunition drain. Experience 
has shown that the basic weapon of the urban guerrilla is the light submachine gun. This weapon, 
in addition to being efficient and easy to shoot in an urban area, has the advantage of being 



greatly respected by the enemy. The guerrilla must thoroughly know how to handle the 
submachine gun, now so popular and indispensable to the Brazilian urban guerrillas. The ideal 
submachine gun for the urban guerrilla is the INA .45 caliber. Other types of submachine guns of 
different calibers can also be used—understanding of course, the problem of ammunition. Thus, 
it is preferable that the manufacturing capabilities of the urban guerrillas be used for the 
production of one type of submachine gun, so that the ammunition to be used can be 
standardized. Each firing group of urban guerrillas must have a submachine gun handled by a 
good marksman. The other members of the group must be armed with .38 revolvers, our standard 
weapon. The .32 is also useful for those who want to participate. But the .38 is preferable since 
its impact usually puts the enemy out of action. Hand grenades and conventional smoke bombs 
can also be considered light weapons, with defensive power for cover and withdrawal. Long- 
barreled weapons are more difficult for the urban guerrilla to transport, and they attract much 
attention because of their size. Among the long-barreled weapons are the FAL, the Mauser guns 
or rifles, hunting guns such as the Winchester, and others. Shotguns can be useful if used at close 
range and point blank. They are useful even for a poor shot, especially at night when precision 
isn't much help. A pressure air-gun can be useful for training in marksmanship. Bazookas and 
mortars can also be used in action, but the conditions for using them have to be prepared and the 
people who use them must be trained. The urban guerrilla should not attempt to base his actions 
on the use of heavy weapons, which have major drawbacks in a type of fighting that demands 
lightweight weapons to insure mobility and speed. Homemade weapons are often as efficient as 
the best weapons produced in conventional factories, and even a sawed-off shotgun is a good 
weapon for the urban guerrilla fighter. 

i) Weapons 

The urban guerrilla's role as a gunsmith has a basic importance. As a gunsmith, he takes care of 
the weapons, knows how to repair them, and in many cases can setup a small shop for 
improvising and producing effective small arms. Experience in metallurgy and on the 
mechanical lathe are basic skills the urban guerrilla should incorporate into his manufacturing 
plans for the construction of homemade weapons. This production, and courses in explosives and 
sabotage, must be organized. The primary materials for practice in these courses must be 
obtained ahead of time, to prevent an incomplete apprenticeship—that is to say, so as to leave no 
room for experimentation. Molotov cocktails, gasoline, homemade contrivances such as 
catapults and mortars for firing explosives, grenades made of pipes and cans, smoke bombs, 
mines, conventional explosives such as dynamite and potassium chlorate, plastic explosives, 
gelatin capsules, and ammunition of every kind are indispensable to the success of the urban 
guerrilla's mission. The methods of obtaining the necessary materials and munitions will be to 
buy them or to take them by force in expropriation actions specially planned and carried out. The 
urban guerrillas will be careful not to keep explosives and other materials that can cause 
accidents around for very long but will always try to use them immediately on their intended 
targets. The urban guerrilla's weapons and his ability to maintain them constitute his firepower. 
By taking advantage of modern weapons and introducing innovations in his firepower and in the 
use of certain weapons, the urban guerrilla can improve many of the tactics of urban warfare. An 
example of this was the innovation made by the Brazilian urban guerrillas when they introduced 



the use of the submachine gun in their attacks on banks. When the massive use of uniform 
submachine guns becomes possible, there will be new changes in urban guerrilla warfare tactics. 
The firing group that utilizes uniform weapons and corresponding ammunition, with reasonable 
care for their maintenance, will reach a considerable level of effectiveness. The urban guerrilla 
increases his effectiveness as he increases his firepower. 


6) THE SHOT; THE URBAN GUERRILLA'S REASON FOR EXISTENCE 

The urban guerrilla's reason for existence, the basic condition in which he acts and survives, is to 
shoot. The urban guerrilla must know how to shoot well, because it is required by this type of 
combat. In conventional warfare, combat is generally at a distance with long-range weapons. In 
unconventional warfare, in which urban guerrilla warfare is included, combat is at short range 
and often very close. To prevent his own death, the urban guerrilla must shoot first, and he 
cannot err in his shot. He cannot waste his ammunition because he does not possess large 
amounts, and so he must conserve it. Nor can he replace his ammunition quickly, since he is a 
part of a small team in which each guerrilla has to be able to look after himself. The urban 
guerrilla can lose no time, and thus has to be able to shoot at once. One basic fact, which we 
want to emphasize completely, and whose importance cannot be overestimated, is that the urban 
guerrilla must not fire continuously, using up his ammunition. It may be that the enemy is 
responding to this fire precisely because he is waiting until the guerrilla's ammunition is all used 
up. At such a moment, without having the opportunity to replace his ammunition, the guerrilla 
faces a rain of enemy fire, and can be taken prisoner or killed. In spite of the value of the surprise 
factor, which many times makes it unnecessary for the urban guerrilla to use his weapons, he 
cannot be allowed the luxury of entering combat without knowing how to shoot. And when face- 
to-face with the enemy, he must always be moving from one position to another, since to stay in 
one place makes him a fixed target and, as such, very vulnerable. The urban guerrilla's life 
depends on shooting, on his ability to handle his weapons well and to avoid being hit. When we 
speak of shooting, we speak of accuracy as well. Shooting must be practiced until it becomes a 
reflex action on the part of the urban guerrilla. To learn how to shoot and have good aim, the 
urban guerrilla must train himself systematically, utilizing every practice method shooting at 
targets, even in amusement parks and at home. Shooting and marksmanship are the urban 
guerrilla's water and air. His perfection of the art of shooting may make him a special type of 
urban guerrilla— that is, a sniper, a category of solitary combatant indispensable in isolated 
actions. The sniper knows how to shoot at close range and at long range, and his weapons are 
appropriate for either type of shooting. 


7) THE FIRING GROUP 

In order to function, the urban guerrillas must be organized into small groups. A team of no more 
than four or five is called a firing group. A minimum of two firing groups, separated and 
insulated from other firing groups, directed and 

coordinated by one or two persons, this is what makes a firing team. Within the firing group, 
there must be complete confidence among the members. The best shot, and the one who knows 



best how to handle the submachine gun, is the person in charge of operations. The firing group 
plans and executes urban guerrilla actions, obtains and stores weapons, and studies and corrects 
its own tactics. When there are tasks planned by the strategic command, these tasks take 
preference. But there is no such thing as a firing group without its own initiative. For this reason, 
it is essential to avoid any rigidity in the guerrilla organization, in order to permit the greatest 
possible initiative on the part of the firing group. The old-type hierarchy, the style of the 
traditional revolutionaries, doesn't exist in our organization. This means that, except for the 
priority of the objectives set by the strategic command, any firing group can decide to raid a 
bank, to kidnap or execute an agent of the dictatorship, a figure identified with the reaction, or a 
foreign spy, and can carry out any type of propaganda or war of nerves against the enemy, 
without the need to consult with the general command. 

No firing group can remain inactive waiting for orders from above. Its obligation is to act. Any 
single urban guerrilla who wants to establish a firing group and begin action can do so, and thus 
becomes a part of the organization. This method of action eliminates the need for knowing who 
is carrying out which actions, since there is free initiative and the only important point is to 
greatly increase the volume of urban guerrilla activity in order to wear out the government and 
force it onto the defensive. The firing group is the instrument of organized action. Within it, 
guerrilla operations and tactics are planned, launched and carried through to success. The general 
command counts on the firing groups to carry out objectives of a strategic nature, and to do so in 
any part of the country. For its part, the general command helps the firing groups with their 
difficulties and with carrying out objectives of a strategic nature, and to do so in any part of the 
country. The organization is an indestructible network of firing groups, and of coordination’s 
among them, that functions simply and practically within a general command that also 
participates in attacks—an organization that exists for no other purpose than that of pure and 
simple revolutionary action. 

8) THE LOGISTICS OF THE URBAN GUERRILLA 

Conventional logistics can be expressed with the formula FFEA: 

F—food 
F—fuel 
E—equipment 
A—ammunition 

Conventional logistics refer to the maintenance problems for an army or a regular armed force, 
transported in vehicles, with fixed bases and supply lines. Urban guerrillas, on the contrary, are 
not an army but small armed groups, intentionally fragmented. They have neither vehicles nor 
rear areas. Their supply lines are precarious and insufficient, and they have no fixed bases except 
in the rudimentary sense of a weapons factory within a house. While the goal of 
conventional logistics is to supply the war needs of the "gorillas" who are used to repress rural 
and urban rebellion, urban guerrilla logistics aim at sustaining operations and tactics which have 
nothing in common with conventional warfare and are directed against the government and 
foreign domination of the country. For the urban guerrilla, who starts from nothing and who has 



no support at the beginning, logistics are expressed by the formula MMWAE, which is: 

M—mechanization 
M—money 
W—weapons 
A—ammunition 
E—explosives 

Revolutionary logistics takes mechanization as one of its bases. Nevertheless, mechanization is 
inseparable from the driver. The urban guerrilla driver is as important as the urban guerrilla 
machine gunner. Without either, the machines do 

not work, and the automobile, as well as the submachine gun becomes a dead thing. An 
experienced driver is not made in one day, and apprenticeship must begin early. Every good 
urban guerrilla must be a driver. As to the vehicles, the 

urban guerrilla must expropriate what he needs. When he already has resources, the urban 
guerrilla can combine the expropriation of vehicles with his other methods of acquisition. 

Money, weapons, ammunition and explosives, and automobiles as well, must be expropriated. 
The urban guerrilla must rob banks and armories and seize explosives and ammunition wherever 
he finds them. None of these operations is carried out for just one purpose. Even when the raid is 
to obtain money, the weapons that the guards carry must be taken as well. Expropriation is the 
first step in organizing our logistics, which itself assumes an armed and permanently mobile 
character. The second step is to reinforce and expand logistics, resorting to ambushes and traps 
in which the enemy is surprised, and his weapons, ammunition, vehicles and other resources are 
captured. Once he has weapons, ammunition and explosives, one of the most serious logistics 
problems facing the urban guerrilla is a hiding place in which to leave the material, and 
appropriate means of transporting it and assembling it where it is needed. This has to be 
accomplished even when the enemy is alerted and has the roads blocked. The knowledge that the 
urban guerrilla possesses of the terrain, and the devices he uses or is capable of using, such as 
scouts specially prepared and recruited for this mission, are the basic elements in solving the 
eternal logistics problems faced by the guerrillas. 

9) CHARACTERISTICS OF THE URBAN GUERRILLA'S TACTICS 

The tactics of the urban guerrilla have the following characteristics: 

1) It is an aggressive tactic, or, in other words, it has an offensive character. As is well known, 
defensive action means death for us. Since we are inferior to the enemy in firepower and have 
neither his resources nor his power base, we cannot defend ourselves against an offensive or a 
concentrated attack by the "gorillas". That is the reason why our urban technique can never be 
permanent, can never defend a fixed base nor remain in any one spot waiting to repel the circle 
of repression. 

2) It is a tactic of attack and rapid withdrawal, by which we preserve our forces. 

3) It is a tactic that aims at the development of urban guerrilla warfare, whose function will be to 
wear out, demoralize and distract the enemy forces, permitting the emergence and survival of 
rural guerrilla warfare, which is destined to play the decisive role in the revolutionary war. 



10) THE INITIAL ADVANTAGES OF THE URBAN GUERRILLA 

The dynamics of urban guerrilla warfare lie in the guerrilla's violent clash with the military and 
police forces of the dictatorship. In this conflict, the police have superiority. The urban guerrilla 
has inferior forces. The paradox is that the urban guerrilla is nevertheless the attacker. The 
military and police forces, for their part, respond to the conflict by mobilizing and concentrating 
greatly superior forces in the pursuit and destruction of the urban guerrilla. The guerrilla can only 
avoid defeat if he depends on the initial advantages he has and knows how to exploit them to the 
end, to compensate for his weakness and lack of material. 

The initial advantages are: 

1) He must take the enemy by surprise. 

2) He must know the terrain of the encounter. 

3) He must have greater mobility and speed than the police and other repressive forces. 

4) His information service must be better than the enemy's. 

5) He must be in command of the situation, and demonstrate a decisiveness so great that 
everyone on our side is inspired and never thinks of hesitating, while on the other side the enemy 
is stunned and incapable of acting. 

11) SURPRISE 

To compensate for his general weakness and shortage of weapons compared to the enemy, the 
urban guerrilla uses surprise. The enemy has no way to combat surprise and becomes confused 
and is destroyed. When urban guerrilla warfare broke out in Brazil, experience proved that 
surprise was essential to the success of any guerrilla operation. The technique of surprise is based 
upon four essential requirements: 

1) We know the situation of the enemy we are going to attack, usually by means of precise 
information and meticulous observation, while the enemy does not know he is going to be 
attacked and knows nothing about the attackers. 

2) We know the strength of the enemy we are going to attack, and the enemy knows nothing 
about our strength. 

3) Attacking by surprise, we save and conserve our forces, while the enemy is unable to do the 
same, and is left at the mercy of events. 

4) We determine the time and place of the attack, fix its duration and establish its objectives. The 
enemy remains ignorant of all of this information. 

12) KNOWLEDGE OF THE TERRAIN 

The urban guerrilla's best ally is the terrain, and because this is so he must know it like the palm 
of his hand. To have the terrain as an ally means to know how to use with intelligence its 
unevenness, its high and low points, its turns, its 

irregularities, its fixed and secret passages, its abandoned areas, its thickets, etc., taking 
maximum advantage of all of this for the success of armed actions, escapes, retreats, covers, and 
hiding places. Impasses and narrow spots, gorges, streets under repair, police checkpoints, 
military zones and closed-off streets, the entrances and exits to tunnels and those that the enemy 
can close off, comers controlled or watched by the police, traffic lights and signals; all this must 
be 



thoroughly known and studied in order to avoid fatal errors. Our problem is to get through and to 
know where and how to hide, leaving the enemy bewildered in areas he doesn't know. Being 
familiar with the avenues, streets, alleys, ins and outs, the comers of the urban centers, its paths 
and shortcuts, its empty lots, its underground passages, its pipes and sewer systems, the urban 
guerrilla safely crosses through the irregular and difficult terrain unfamiliar to the police, where 
the police can be surprised in a fatal ambush or trap at any moment. Because he knows the 
terrain, the urban guerrilla can pass through it on foot, on bicycle, in a car, jeep or small truck, 
and never be trapped. Acting in small 

groups with only a few people, the guerrillas can rendezvous at a time and place determined 
beforehand, following up the initial attack with new guerrilla operations, or evading the police 
cordon and disorienting the enemy with their unexpected audacity. It is an impossible problem 
for the police, in the labyrinthian terrain of the urban guerrilla, to catch someone they cannot see, 
to repress someone they cannot catch, and to close in on someone they cannot find. Our 
experience is that the ideal guerrilla is one who operates in his own city and thoroughly knows 
its streets, its neighborhoods, its transit problems, and its other peculiarities. The guerrilla 
outsider, who comes to a city whose streets are unfamiliar to him, is a weak spot, and if he is 
assigned certain operations, he can endanger them. To avoid grave mistakes, it is necessary for 
him to get to know the layout of the streets. 

13) MOBILITY AND SPEED 

To insure a mobility and speed that the police cannot match, the urban guerrilla 
needs the following: 

1) Mechanization 

2) Knowledge of the terrain 

3) A dismption or suspension of enemy transport and communications 

4) Light weapons 

By carefully carrying out operations that last only a few moments, and leaving the site in 
mechanized vehicles, the urban guerrilla beats a rapid retreat, escaping capture. The urban 
guerrilla must know the way in detail, and, in this manner, must go through the schedule ahead 
of time as a training, to avoid entering alleyways that have no exit, or running into traffic jams, 
or being stopped by the Transit Department's traffic signals. The police pursue the urban 
guerrilla blindly, without knowing which road he is using for his escape. While the urban 
guerrilla escapes quickly because he knows the terrain, the police lose the trail and give up the 
chase. The urban guerrilla must launch his operations far from the logistical centers of the police. 
A primary advantage of this method of operation is that it places us at a reasonable distance from 
the possibility of capture, which facilitates our evasion. In addition to this necessary precaution, 
the urban guerrilla must be concerned with the enemy's communication system. The telephone is 
the primary target in preventing the enemy from access to information, by knocking out his 
communications systems. Even if he knows about the guerrilla operation, the enemy depends on 
modem transportation for his logistics support, and his vehicles necessarily lose time carrying 
him through the heavy traffic of the large cities. It is clear that the tangled and treacherous traffic 
is a disadvantage for the enemy, as it would be for us if we were not ahead of him. If we want to 
have a safe margin of security and be certain to leave no tracks for the future, we can adopt the 



following methods: 

1) Deliberately intercept the police with other vehicles, or by seemingly casual inconveniences 
and accidents; but in this case the vehicles in question should neither be legal nor have real 
license numbers 

2) Obstruct the roads with fallen trees, rocks, ditches, false traffic signs, dead ends or detours, or 
other clever methods 

3) Place homemade mines in the way of the police; use gasoline or throw Molotov cocktails to 
set their vehicles on fire 

4) Set off a burst of submachine gun fire or weapons such as the FAL aimed at the motor and 
tires of the cars engaged in the pursuit 

With the arrogance typical of the police and the military authorities, the enemy will come to fight 
us equipped with heavy guns and equipment, and with elaborate maneuvers by men armed to the 
teeth. The urban guerrilla must respond to this with light weapons that can be easily transported, 
so he can always escape with maximum speed without ever accepting open fighting. The urban 
guerrilla has no mission other than to attack and quickly withdraw. We would leave ourselves 
open to the most crushing defeats if we burdened ourselves with heavy weapons and with the 
tremendous weight of the ammunition necessary to use them, at the same time losing our 
precious gift of mobility. When our enemy fights against us with the cavalry, we are at no 
disadvantage as long as we are mechanized. The automobile goes faster than the horse. From 
within the car, we also have the target of the mounted police, knocking him down with 
submachine gun and revolver fire or with Molotov cocktails and hand grenades. On the other 
hand, it is not so difficult for an urban guerrilla on foot to make a target of a policeman on 
horseback. Moreover, ropes across the street, marbles, and cork stoppers are very efficient 
methods of making them fall. The great disadvantage faced by the mounted policeman is that he 
presents the urban guerrilla with two excellent targets—the horse and its rider. 

Apart from being faster than the horseman, the helicopter has no better chance in pursuit. If the 
horse is too slow compared to the urban guerrilla's automobile, the helicopter is too fast. Moving 
at 200 kilometers an hour, it will never succeed in hitting from above a target that is lost among 
the crowds and street vehicles, nor can the helicopter land in public streets in order to capture 
someone. At the same time, whenever it flies too low, it will be excessively vulnerable to the fire 
of the urban guerrillas. 


14) INFORMATION 

The chances that the government has for discovering and destroying the urban guerrillas lessens 
as the power of the dictatorship's enemies becomes greater and more concentrated among the 
population. This concentration of the opponents of the dictatorship plays a very important role in 
providing information about the actions of the police and government officials, as well as hiding 
the activities of the guerrillas. The enemy can also be thrown off with false information, which is 
worse for him because it is a tremendous waste. By whatever means, the sources of information 
at the disposal of the urban guerrilla are potentially better than those of the police. The enemy is 
observed by the people, but he does not know who among the people transmits information to 



the urban guerrillas. The military and the police are hated by the people for the injustices and 
violence they have committed, and this facilitates obtaining information which is damaging to 
the activities of government agents. Information, which is only a small segment of popular 
support, represents an extraordinary potential in the hands of the urban guerrilla. 

The creation of an intelligence service, with an organized structure, 
is a basic need for us [26]. 

The urban guerrilla has to have vital information about the plans and movements of the enemy; 
where they are, how they move, the resources of their banking network, their means of 
communication, and the secret activities they carry out. The reliable information passed on to the 
guerrillas represents a well-aimed blow at the dictatorship. The dictatorship has no way to defend 
itself in the face of an important leak which facilitates our destructive attacks. The enemy also 
wants to know what actions we are planning so he can destroy us or prevent us from acting. In 
this sense, the danger of betrayal is present, and the enemy encourages betrayal and infiltrates 
spies into the guerrilla organization. The urban guerrilla's technique against this enemy tactic is 
to denounce publicly the spies, traitors, informers and provocateurs. Since our struggle takes 
place among the people and depends on their sympathy—while the government has a bad 
reputation because of its brutality, corruption and incompetence—the informers, spies, traitors 
and the police come to be enemies of the people, without supporters, denounced to the urban 
guerrillas and, in many cases, properly punished. For his part, the urban guerrilla must not evade 
the duty—once he knows who the spy or informer is—of physically wiping him out. This is the 
proper 

[26] This is to be exploited via infiltrations and counter-surveillance. 

method, approved by the people, and it minimizes considerably the incidence of infiltration or 
enemy spying. For complete success in the battle against spies and informers, it is essential to 
organize a counter-espionage or counter-intelligence service. Nevertheless, as far as information 
is concerned, it cannot all be reduced to a matter of knowing the enemy's moves and avoiding the 
infiltration of spies. Intelligence information must be broad—it must embrace everything, 
including the most insignificant material. There is a technique of obtaining information, and the 
urban guerrilla must master it. Following this technique, intelligence information is obtained 
naturally, as a part of the life of the people. The urban guerrilla, living in the midst of the 
population and moving about among them, must be attentive to all types of conversations and 
human relations, learning how to disguise his interest with great skill and judgement. 

In places where people work, study, and live, it is easy to collect all kinds of information on 
payments, business, plans of all kinds, points of view, opinions, people's state of mind, trips, 
interior layout of buildings, offices and rooms, operations centers, etc. Observation, 
investigation, reconnaissance, and exploration of the terrain are also excellent sources of 
information. The urban guerrilla never goes anywhere absentmindedly and without revolutionary 
precaution, always on the alert lest something occurs. Eyes and ears open, senses alert, his 
memory is engraved with everything necessary, now or in the future, to the continued activity of 



the guerrilla fighter. Careful reading of the press with particular attention to the mass 
communication media, the research of accumulated data, the transmission of news and 
everything of note, a persistence in being informed and in informing others, all this makes up the 
intricate and immensely complicated question of information which gives the urban guerrilla a 
decisive advantage. 


15) DECISIVENESS 

It is not enough for the urban guerrilla to have in his favor surprise, speed, knowledge of the 
terrain, and information. He must also demonstrate his command of any situation and a capacity 
for decisiveness, without which all other advantages will prove to be useless. It is impossible to 
carry out any action, however well-planned, if the urban guerrilla turns out to be indecisive, 
uncertain, irresolute. Even an action successfully begun can end in defeat if command of the 
situation and the capacity for decision falter in the middle of the execution of the plan. When this 
command of the situation and a capacity for decision are absent, the void is filled with hesitation 
and terror. The enemy takes advantage of this failure and is able to liquidate us. The secret of the 
success of any operation, simple or complex, easy or difficult, is to rely on determined men. 
Strictly speaking, there are no simple operations: all must be carried out with the same care taken 
in the most difficult, beginning with the choice of the human elements—which means relying on 
leadership and the capacity for decision in every situation. One can see ahead of time whether an 
action will be successful or not by the way its participants act during the preparatory period. 
Those who fall behind, who fail to make designated contacts, are easily confused, forget things, 
fail to complete the basic tasks of the work, possibly are indecisive men and can be a danger. It is 
better not to include them. Decisiveness means to put into practice the plan that has been devised 
with determination, with audacity, and with an absolute firmness. It takes only one person who 
hesitates to lose all. 


16) OBJECTIVES OF THE GUERRILLA'S ACTIONS 

With his tactics developed and established, the urban guerrilla trains himself in methods of 
action leading to attack, and, in Brazil, has the following objectives: 

1) To threaten the triangle within which the Brazilian state and North American domination are 
maintained, a triangle whose points are Rio, Sao Paulo and Belo Horizonte, and whose base is 
the axis Rio—San Paulo, where the giant 

industrial, financial, economic, political, cultural, military, and police complex that holds the 
decisive power of the country is located. 

2) To weaken the local militia and the security systems of the dictatorship, given the fact that we 
are attacking and the ''gorillas" 

defending, which means catching the government in a defensive position with its troops 
immobilized in the defense of the entire complex of national maintenance, with its ever-present 
fears of an attack on its strategic nerve centers, and without ever knowing where, how or when 
the attack will come. 

3) To attack every area with many different armed groups, small in size, each self-contained and 



operating independently, to disperse the government forces in their pursuit of a thoroughly 
fragmented organization, instead of offering the dictatorship the opportunity to concentrate its 
forces in the destruction of one tightly organized system operating throughout the country. 

4) To give proof of its combativeness, decision, firmness, determination, and persistence in the 
attack on the military dictatorship, in order to allow all rebels to follow in our example and to 
fight with urban guerrilla tactics. Meanwhile, the government with all of its problems, incapable 
of halting guerrilla action within the cities, will lose time and suffer endless attrition, and will 
finally be forced to pull back its repressive forces in order to mount guard over all the banks, 
industries, armories, military barracks, prisons, public offices, radio and television stations, 
North American firms, gas storage tanks, oil refineries, ships, airplanes, ports, airports, hospitals, 
health centers, blood banks, 

stores, garages, embassies, residences of high-ranking members of the regime such as ministers 
and generals, police stations, official organizations, etc. 

5) To increase urban guerrilla actions gradually into an endless number of surprise raids, such 
that the government cannot leave the urban area to pursue guerrillas in the rural interior without 
running the risk of abandoning the cities and pennitting rebellion to increase on the coast as well 
as the interior of the country. 

6) To force the Army and the police, their commanders and their assistants, to give up the 
relative comfort and tranquility of their barracks and their usual rest, for a state of fear and 
growing tension in the expectation of attack, or in a search for trails which vanish without a 
trace. 

7) To avoid open battle and decisive combat with the government, limiting the struggle to brief, 
rapid attacks with lightning results. 

8) To insure for the urban guerrilla a maximum freedom of movement and of action, without 
ever relinquishing the use of armed action, remaining firmly oriented towards helping the 
formation of rural guerrilla warfare and supporting 

the construction of a revolutionary army for national liberation. 


17) ON THE TYPES AND NATURE OF MISSIONS FOR THE URBAN GUERRILLA 

In order to achieve the objectives previously listed, the urban guerrilla is obliged, in his tactics, 
to follow missions whose nature is as different or diversified as possible. The urban guerrilla 
does not arbitrarily choose this or that mission. Some actions are simple; others are complicated. 
The inexperienced guerrilla must be gradually introduced into actions and operations which run 
from the simple to the complex. He begins with small missions and tasks until he becomes 
completely experienced. Before any action, the urban guerrilla must think of the methods and the 
personnel at his disposal to carry out the mission. Operations and actions that demand the urban 
guerrilla's technical preparation cannot be carried out by someone who lacks the technical skill. 
With these precautions, the missions which the urban guerrilla can undertake are the following: 

1) Assaults 

2) Raids and penetrations 

3) Occupations 

4) Ambushes 



5) Street tactics 

6) Strikes and work stoppages 

7) Desertions, diversions, seizures, 

8) Expropriation of weapons, 

9) Ammunition and explosives 

10) Liberation of prisoners 

11) Executions 

12) Kidnappings 

13) Sabotage 

14) Terrorism 

15) Armed propaganda 

16) War of nerves 


18) ASSAULTS 

Assaults are the armed attacks which we make to expropriate funds, liberate prisoners, capture 
explosives, submachine guns, and other types of weapons and ammunition. Assaults can take 
place in broad daylight or at night. Daytime assaults are made when the objective cannot be 
achieved at any other hour, such as the transport of money by banks, which is not done at night. 
Night assault is usually the most advantageous for the guerrilla. The ideal is for all assaults to 
take place at night, when conditions for a surprise attack are most favorable and the darkness 
facilitates escape and hides the identity of the participants. The urban guerrilla must prepare 
himself, nevertheless, to act under all conditions, daytime as well as night. 

The most vulnerable targets for assaults are the following: 

1) Credit establishments 

2) Commercial and industrial enterprises, including plants for the manufacture of weapons and 
explosives 

3) Military establishments 

4) Commissaries and police stations 

5) Jails 

6) Government property 

7) Mass communications media 

8) North American firms and properties 

9) Government vehicles, including military and police vehicles, trucks, armored vehicles, money 
carriers, trains, ships, and airplanes. The assaults on businesses use the same tactics, because in 
every case the buildings represent a fixed target. Assaults on buildings are planned as guerrilla 
operations, varied according to whether they are against banks, a commercial enterprise, 
industries, military bases, commissaries, prisons, radio stations, warehouses for foreign firms, 
etc. The assault on vehicles—money-carriers, armored vehicles, trains, ships, airplanes—are of 
another nature, since they are moving targets. The nature of the operation varies according to the 
situation and the circumstances—that is, whether the vehicle is stationary or moving. Armored 
cars, including military vehicles, are not immune to mines. Roadblocks, traps, ruses, interception 



by other vehicles, Molotov cocktails, shooting with heavy weapons, are efficient methods of 
assaulting vehicles. Heavy vehicles, grounded airplanes and anchored ships can be seized, and 
their crews and guards overcome. Airplanes in flight can be hijacked by guerrilla action or by 
one person. Ships and trains in motion can be assaulted or captured by guerrilla operations in 
order to obtain weapons and ammunition or to prevent troop movements. 


19) THE BANK ASSAULT AS POPULAR MISSION 

The most popular mission is the bank assault. In Brazil, the urban guerrillas have begun a type of 
organized assault on the banks as a guerrilla operation. Today, this type of assault is widely used, 
and has served as a sort of preliminary test for the urban guerrilla in his training in the tactics of 
urban guerrilla warfare. Important innovations in the tactics of assaulting banks have developed, 
guaranteeing escape, the withdrawal of money, and the anonymity of those involved. Among 
these innovations, we cite the shooting of tires of cars to prevent pursuit, locking people in the 
bank bathroom, making them sit on the floor, immobilizing the bank guards and taking their 
weapons, forcing someone to open the safe or the strong box, and using disguises. Attempts to 
install bank alarms, to use guards or electronic detection devices prove fruitless when the assault 
is political and is carried out according to urban guerrilla warfare techniques. This guerrilla 
method uses new techniques to meet the enemy's tactical changes, has access to firepower that is 
growing every day, becomes increasingly more experienced and more confident, and uses a 
larger number of guerrillas every time; all to guarantee the success of operations planned down 
to the last detail. The bank assault is a typical expropriation. But, as is true with any kind of 
armed expropriator action, the guerrilla is handicapped by a two-fold competition: 

1) competition from the outlaw 

2) competition from the right-wing counter-revolutionary 

This competition produces confusion, which is reflected in the people's uncertainty. It is up to the 
urban guerrilla to prevent this from happening, and to accomplish this he must use two methods: 

1) He must avoid the outlaw's technique, which is one of unnecessary violence and the 
expropriation of goods and possessions belonging to the people. 

2) He must use the assault for propaganda purposes at the very moment it is taking place, and 
later distribute material, leaflets—every possible means of explaining the objectives and the 
principles of the urban guerrillas, as expropriator 

of the government and the ruling elite. 


20) RAIDS AND PENETRATIONS 

Raids and penetrations are rapid attacks on establishments located in neighborhoods, or even in 
the center of the city, such as small military units, commissaries, hospitals, to cause trouble, seize 
weapons, punish and terrorize the enemy, take reprisals, or to rescue wounded prisoners or those 
hospitalized under police guard. Raids and penetrations are also made on garages and depots to 
destroy vehicles and damage installations, especially if they are North American firms and 
property. When they take place on certain stretches of highway or in certain distant 



neighborhoods, these raids can serve to force the enemy to move great numbers of troops, a 
totally useless effort since when they get there they will 

find nobody to fight. When they are carried out on certain houses, offices, archives or public 
offices, their purpose is to capture or search for secret papers and documents with which to 
denounce deals, compromises and the corruption of men in government, their dirty deals and 
criminal transactions. Raids and penetrations are most effective if they are carried out at night. 


21) OCCUPATIONS 

Occupations are a type of attack carried out when the urban guerrilla stations himself in specific 
establishments and locations, for a temporary action against the enemy or for some propaganda 
purpose. The occupation of factories and schools during strikes, or at other times, is a method of 
protest or of distracting the enemy's attention. The occupation of radio stations is for propaganda 
purposes. Occupation is a highly effective model for action but, in order to prevent 
losses and material damage to our forces, it is always a good idea to plan on the possibility of a 
forced withdrawal. It must always be meticulously planned and carried out at the opportune 
moment. Occupations always have a time limit, and the swifter they are completed, the better. 


22) AMBUSH 

Ambushes are attacks, typified by surprise, when the enemy is trapped on the road or when he 
makes a police net surrounding a house or estate. A false alarm can bring the enemy to the spot, 
where he falls into a trap. The principle object of the ambush is to capture enemy weapons and to 
punish him with death. Ambushes to halt passenger trains are for propaganda purposes, and, 
when they are troop trains, the object is to annihilate the enemy and seize his weapons. The 
urban guerrilla sniper is the kind of fighter especially suited for ambush, because he can hide 
easily in the irregularities of the terrain, on the roofs and the tops of buildings and apartments 
under construction. From windows and dark places, he can take careful aim at his chosen target. 
Ambush has devastating effects on the enemy, leaving him unnerved, insecure and fearful. 


23) STREET TACTICS 

Street tactics are used to fight the enemy in the streets, utilizing the participation of the 
population against him. In 1968, the Brazilian students used excellent street tactics against police 
troops, such as marching down streets against traffic and using slingshots and marbles against 
mounted police. Other street tactics consist of constructing barricades; pulling up paving blocks 
and hurling them at the police; throwing bottles, bricks, paperweights and other projectiles at the 
police from the top of office and apartment buildings; using buildings and other structures for 
escape, for hiding and for supporting surprise attacks. It is equally necessary to know how to 
respond to enemy tactics. When the police troops come wearing helmets to protect them against 
flying objects, we have to divide ourselves into two teams—one to attack the enemy from the 



front, the other to attack him in the rear—withdrawing one as the other goes into action to 
prevent the first from being struck by projectiles hurled by the second. By the same token, it is 
important to know how to respond to the police net. When the police designate certain of their 
men to go into the crowd and arrest a demonstrator, a larger group of urban guerrillas must 
surround the police group, disarming and beating them and at the same time allowing the 
prisoner to escape. This urban guerrilla operation is called "the net within a net”. When the 
police net is formed at a school building, a factory, a place where demonstrators gather, or some 
other point, the urban guerrilla must not give up or allow himself to be taken by surprise. To 
make his net effective, the enemy is obliged to transport his troops in vehicles and special cars to 
occupy strategic points in the streets, in order to invade the building or chosen locale. The urban 
guerrilla, for his part, must never clear a building or an area and meet in it without first knowing 
its exits, the way to break an encirclement, the strategic points that the police must occupy, and 
the roads that inevitably lead into the net, and he must hold other strategic points from which to 
strike at the enemy. The roads followed by police vehicles must be mined at key points along the 
way and at forced roadblocks. When the mines explode, the vehicles will be knocked into the air. 
The police will be caught in the trap and will suffer losses and be victims of an ambush. The net 
must be broken by escape routes which are unknown to the police. The rigorous planning of a 
withdrawal is the best way to frustrate any encircling effort on the part of the enemy. When there 
is no possibility of an escape plan, the urban guerrilla must not hold meetings, gatherings or do 
anything, since to do so will prevent him from breaking through the net which the enemy will 
surely try to throw around him. Street tactics have revealed a new type of urban guerrilla who 
participates in mass protests. This is the type we designate as the "urban guerrilla demonstrator", 
who joins the crowds and participates in marches with specific and definite aims in mind. The 
urban guerrilla demonstrator must initiate the "net within the net", ransacking government 
vehicles, official cars and police vehicles before turning them over or setting fire to them, to see 
if any of them have money or weapons. 

Snipers are very good for mass demonstrations, and along with the urban guerrilla 
demonstrator can play a valuable role. Hidden at strategic points, the snipers have 
complete success using shotguns or submachine guns, which can easily cause losses among 
the enemy. 

24) STRIKES AND WORK INTERRUPTIONS 

The strike is a model of action employed by the urban guerrilla in work centers and schools to 
damage the enemy by stopping work and study activities. Because it is one of the weapons most 
feared by the exploiters and oppressors, the enemy uses tremendous firepower and incredible 
violence against it. The strikers are taken to prison, suffer beatings, and many of them wind up 
killed. The urban guerrilla must prepare the strike in such a way as to leave no track or clue that 
can identify the leaders of such an action. A strike is successful when it is organized by a small 
group, if it is carefully prepared in secret using the most clandestine methods. Weapons, 
ammunition, Molotov cocktails, homemade weapons of destruction and attack, all of these must 
be supplied beforehand in order to meet the enemy. So that the action can do the greatest 
possible amount of damage, it is a good idea to study and put into effect a sabotage plan. Strikes 



and study interruptions, although they are of brief duration, cause severe damage to the enemy. It 
is enough for them to crop up at different locations and in differing sections of the same area, 
disrupting daily life, occurring endlessly, one after the other, in true guerrilla fashion. In strikes 
or in simple work interruptions, the urban guerrilla has recourse to the occupation or penetration 
of the site, or he can simply make a raid. In that case, his objective is to take captives, to capture 
prisoners, or to capture enemy agents and propose an exchange for arrested strikers. In certain 
cases, strikes and brief work interruptions can offer an excellent opportunity for preparing 
ambushes or traps, whose aim is the physical destruction of the police. The basic fact is that the 
enemy suffers losses as well as material and moral damage and is weakened by the action. 


25) DESERTIONS, DIVERSIONS, SEIZURES, EXPROPRIATION OF 
AMMUNITION AND EXPLOSIVES 

Desertion and the diversion of weapons are actions carried out in military bases, ships, military 
hospitals, etc. The urban guerrilla soldier or officer must desert at the most opportune moment 
with modem weapons and ammunition, to hand them over to the guerrillas. One of the most 
opportune moments is when the urban guerrilla soldier is called upon to pursue his guerrilla 
comrades outside the military base. Instead of following the orders of the "gorillas", the military 
urban guerrilla must join the ranks of the revolutionaries by handing over the weapons and 
ammunition he carries, or the military vehicle he operates. The advantage of this method is that 
the rebels receive weapons and ammunition from the Army, Navy, Air Force, Military Police, 
Civilian Guard or the Police without any great work, since it reaches their hands by government 
transportation. Other opportunities may occur in the barracks, and the military urban guerrilla 
must always be alert to this. In case of carelessness on the part of commanders or in other 
favorable conditions—such as bureaucratic attitudes or the relaxation of discipline on the part of 
lieutenants or other internal personnel—the military urban guerrilla must no longer wait but must 
try to inform the guerrillas and desert with as large a supply of weapons as possible. When there 
is no possibility of deserting with weapons and ammunition, the military urban guerrilla must 
engage in sabotage, starting fires and explosions in munitions dumps. This technique of deserting 
with weapons and of raiding and sabotaging the military centers is the best way of wearing out 
and demoralizing the enemy and leaving them confused. The urban guerrilla's purpose in 
disarming an individual enemy is to capture his weapons. These weapons are usually in the 
hands of sentinels or others whose task is guard duty. The capture of weapons may be 
accomplished by violent means or by cleverness and tricks or traps. When the enemy is 
disarmed, he must be searched for weapons other than those already taken from him. If we are 
careless, he can use the weapons that were not seized to shoot the urban guerrilla. The seizure of 
weapons is an efficient method of acquiring submachine guns, the urban guerrilla's most 
important weapon. When we carry out small operations or actions to seize weapons and 
ammunition, the material captured may be for personal use or for armaments and supplies for the 
firing teams. The necessity to provide firepower for the urban guerrillas is so great that, in order 
to take off from the zero point, we often have to purchase one weapon, divert or capture a single 
gun. The basic point is to begin, and to begin with a spirit of decisiveness and boldness. The 
possession of a single submachine gun multiplies our forces. In a bank assault, we must be 



careful to seize the weapons of the bank guard. The rest of the weapons will be found with the 
treasurer, the bank tellers or the manager, and must also be seized. Quite often, we succeed in 
capturing weapons in police stations, as a result of raids. The capture of weapons, ammunition 
and explosives is the urban guerrilla's goal in assaulting commercial businesses, industries and 
quarries. 

26) LIBERATION OF PRISONERS 

The liberation of prisoners is an armed action designed to free jailed urban guerrillas. In daily 
struggle against the enemy, the urban guerrilla is subject to arrest, and can be sentenced to 
unlimited years in jail. This does not mean that the battle ends here. For the guerrilla, his 
experience is deepened by prison, and struggle continues even in the dungeons where he is held. 
The imprisoned guerrilla views the prisons of the enemy as a terrain which he must dominate and 
understand in order to free himself by a guerrilla operation. There is no jail, either on an island, 
in a city penitentiary, or on a farm, that is impregnable to the slyness, cleverness and firepower 
of the rebels. The urban guerrilla who is free views the jails of the enemy as the inevitable site of 
guerrilla actions designed to liberate his ideological comrades from prison. It is this combination 
of the urban guerrilla in freedom and the urban guerrilla in jail that results in the anned 
operations we refer to as "liberation of prisoners". 

The guerrilla operations that can be used in liberating prisoners are the following; 

1) Riots in penal establishments, in correctional colonies or camps, or on transport or prison 
ships; 

2) Assaults on urban or rural prisons, detention centers, prison camps, or any other permanent or 
temporary place where prisoners are held; 

3) Assaults on prisoner transport trains or convoys; 

4) Raids and penetrations of prisons; 

5) Ambushing of guards who move prisoners. 

27) EXECUTIONS 

Execution is the killing of a foreign spy, of an agent of the dictatorship, of a police torturer, of a 
dictatorial personality in the government involved in crimes and persecutions against patriots, of 
a stool pigeon, informer, police agent or police provocateur. Those who go to the police of their 
own free will to make denunciations and accusations, who supply information and who finger 
people, must be executed when they are caught by the urban guerrillas. Execution is a secret 
action, in which the least possible number of urban guerrillas are involved. In many cases, the 
execution can be carried out by a single sniper, patient, alone and unknown, and operating in 
absolute secrecy and in cold blood. 

28) KIDNAPPING 

Kidnapping is capturing and holding in a secret place a spy, political personality or a notorious 
and dangerous enemy of the revolutionary movement. Kidnapping is used to exchange or liberate 
imprisoned revolutionaries or to force the 

suspension of torture in jail by the military dictatorship. The kidnapping of personalities who are 



well-known artists, sports figures or who are outstanding in some other field, but who have 
evidenced no political interest, can be a useful form of propaganda for the guerrillas, provided it 
occurs under special circumstances, and is handled so the public understands and sympathizes 
with it. The kidnappings of foreigners or visitors constitutes a form of protest against the 
penetration and domination of imperialism in our country. 

29) SABOTAGE 

Sabotage is a highly destructive type of attack using very few persons—and sometimes requiring 
only one—to accomplish the desired result. When the urban guerrilla uses sabotage, the first step 
is isolated sabotage. Then comes the step of dispersed and general sabotage, carried out by the 
population. Well-executed sabotage demands study, planning and careful action. A characteristic 
form of sabotage is explosion, using dynamite, fire or the placing of mines. A little sand, a trickle 
of any kind of combustible, a poor lubrication job, a screw removed, a short circuit, inserted 
pieces of wood or iron, can cause irreparable damage. The objective of sabotage is to hurt, to 
damage, to make useless and to destroy vital enemy points such as the following: 

1) the economy of the country 

2) agricultural or industrial production 

3) transport and communication systems 

4) military and police systems and their establishments and depots 

5) the repressive military-police system 

6) the firms and properties of exploiters in the country 

The urban guerrilla should endanger the economy of the country, particularly its economic and 
financial aspects, such as its domestic and foreign banking network, its exchange and credit 
systems, its tax collection system, etc. Public offices, centers of government and government 
depots are easy targets for sabotage. Nor will it be easy to prevent the sabotage of agricultural 
and industrial production27 by the urban guerrilla, with his thorough knowledge of the local 
situation. Factory workers acting as urban guerrillas are excellent industrial saboteurs, since they, 
better than anyone, understand the industry, the factory, the machinery or the part most likely to 
destroy an entire operation, doing much more damage than a poorly-informed layman could do. 
27 Do not emulate needless destruction of private property. A factory is just a building. A factory 
owner, however, is an individual, who may be held liable to any crimes which he has committed 
in service of the Zionist menace. Sabotage is only a valid tactic against factories of the enemy. 
Choose your targets wisely with respect to the enemy's transport and communications systems, 
beginning with railway traffic, it is necessary to attack them systematically with sabotage. The 
only caution is against causing death and injury to passengers, especially regular commuters on 
suburban and long-distance trains. Attacks on freight trains, rolling or stationary stock, stoppage 
of military transports and communications systems, these are the major objectives in this area. 
Sleepers can be damaged and pulled up, as can rails. A tunnel blocked by a barrier of explosives, 
or an obstruction caused by a derailed car, causes enormous harm. The derailment of a train 
carrying fuel is of major damage to the enemy. So is dynamiting a railroad bridge. In a system 
where the size and weight of the rolling equipment is enormous, it takes months for workers to 
repair or rebuild the destruction and damage. As for highways, they can be obstructed with trees, 



stationary vehicles, ditches, dislocation of barriers by dynamite, and bridges destroyed by 
explosions. Ships can be damaged at anchor in seaports or riverports, or in the shipyards. Aircraft 
can be destroyed or damaged on the ground. Telephone and telegraph lines can be systematically 
damaged, their towers blown up, and their lines made useless. Transport and communications 
must be sabotaged immediately because the revolutionary movement has already begun in 
Brazil, and it is essential to impede the enemy's movement of troops and munitions. Oil lines, 
fuel plants, depots for bombs and ammunition arsenals, military camps and bases must become 
targets for sabotage operations, while vehicles, army trucks and other military or police vehicles 
must be destroyed wherever they are found. The military and police repression centers and their 
specialized organs must also claim the attention of the guerrilla saboteur. Foreign firms and 
properties in the country, for their part, must become such frequent targets of sabotage that the 
volume of actions directed against them surpasses the total of all other actions against enemy 
vital points. 


30) TERRORISM 

Terrorism is an action, usually involving the placement of an explosive or firebomb of great 
destructive power, which is capable of effecting irreparable loss against the enemy. Terrorism 
requires that the urban guerrilla should have adequate theoretical and practical knowledge of 
how to make explosives. The terrorist act, apart from the apparent ease with which it can be 
carried out, is no different from other guerrilla acts and actions whose success depends on 
planning and determination. It is an action which the urban guerrilla must execute with the 
greatest calmness and determination. Although terrorism generally involves an explosion, there 
are cases in which it may be carried out through executions or the systematic burning of 
installations, properties, plantations, etc. It is essential to point out the importance of fires and the 
construction of incendiary devices such as gasoline bombs in the technique of guerrilla terrorism. 
Another thing is the importance of the material the urban guerrilla can persuade the people to 
expropriate in the moments of hunger and scarcity brought about by the greed of the big 
commercial interests28. Terrorism is a weapon the revolutionary can never relinquish. 


31) ARMED PROPAGANDA 

The coordination of urban guerrilla activities, including each armed action, is the primary way of 
making armed propaganda. These actions carried out with specific objectives and aims in mind, 
inevitably become propaganda material for the mass communication system. Bank robberies, 
ambushes, desertions and the diverting of weapons, the rescue of prisoners, executions, 
kidnappings, sabotage, terrorism and the war of nerves are all cases in point. Airplanes diverted 
in flight by guerrilla action, ships and trains assaulted and seized by armed guerrillas, can also be 
carried out solely for propaganda effect. But the urban guerrilla must never fail to install a 
clandestine press and must be able to turn out mimeographed copies using alcohol or electric 
plates and other duplicating apparatus, expropriating what he cannot buy in order to produce 
small clandestine newspapers, pamphlets, flyers and stamps for propaganda and agitation against 
the dictatorship. The urban guerrilla engaged in clandestine printing facilitates enormously the 



incorporation of large numbers of people into the struggle, by opening a pemranent work front 
for those willing to carry on propaganda, even when to do so means to act alone and risk their 
lives. With the existence of clandestine propaganda and agitational material, the inventive spirit 
of the urban guerrilla expands and creates catapults, artifacts, mortars and other instruments with 
which to distribute the anti-government propaganda at a distance. Tape recordings, the 
occupation of radio stations, the use of loudspeakers, graffiti on walls and other inaccessible 
places are other forms of propaganda. A consistent propaganda by letters sent to specific 
addresses, explaining the meaning of the urban guerrilla's armed actions, produces considerable 
results and is one method of influencing certain segments of the population. Even this 
influence—exercised in the heart of the people by every possible propaganda device, revolving 
around the activity of the urban guerrilla—does not indicate that our forces have everyone's 
support. It is enough to win the support of a portion of the population, and this can be done by 
popularizing the motto, "Let he who does not wish to do anything for the guerrillas do nothing 
against them.” 


32) THE WAR OF NERVES 

The war of nerves or psychological warfare is an aggressive technique, based on the direct or 
indirect use of mass media and rumors in order to demoralize the government. In psychological 
warfare, the government is always at a disadvantage because it imposes censorship on the media 
and winds up in a defensive position by not allowing anything against it to filter through. At this 
point, it becomes 

28 Who the National Socialist recognizes are controlled by the Council of 300 and the 
International Jew, among other helper golems. WE SHALL SEVER THE HEAD OF THE 
SNAKE! 

desperate, is involved in greater contradictions and loss of prestige, and loses time and energy in 
an exhausting effort at control which is liable to be broken at any moment. The objective of the 
war of nerves is to mislead, spreading lies among the authorities in which everyone can 
participate, thus creating an atmosphere of nervousness, discredit, insecurity, uncertainty and 
concern on the part of the government 29. The best methods used by urban guerrillas in the war 
of nerves are the following: 

1) Using the telephone and the mail to announce false clues to the police and government, 
including information on the planting of bombs and any other act of terrorism in public offices 
and other places—kidnapping and assassination plans, etc.—to force the authorities to wear 
themselves out by following up on the false information fed to them; 

2) Letting false plans fall into the hands of the police to divert their attention; 

3) Planting rumors to make the government uneasy; 

4) Exploiting by every means possible the corruption, the mistakes and the failures of the 
government and its representatives, forcing them into demoralizing explanations and 
justifications in the very communication media they wish to maintain under censorship; 

5) Presenting denunciations to foreign embassies, the United Nations, the papal enunciator, and 



the international commissions defending human rights or freedom of the press, exposing each 
concrete violation and each use of violence by the military dictatorship and making it known that 
the revolutionary war will continue with serious danger for the enemies of the population. 

33) HOW TO CARRY OUT THE ACTION 

The urban guerrilla who correctly carries through his apprenticeship and training must give the 
greatest possible importance to his method of carrying out actions, for in this he cannot commit 
the slightest error. Any carelessness in learning tactics and their use invites certain disaster, as 
experience teaches us every day. Common criminals commit errors frequently because of their 
tactics, and this is one of the reasons why the urban guerrillas must be so insistently preoccupied 
with following revolutionary tactics, and not the tactics of bandits. And not only for that reason. 
There is no urban guerrilla worthy of the name who ignores the revolutionary method of action 
and fails to practice it rigorously in the planning and execution of his activities. 29 Note here 
again the indiscriminate terrorism of the evil lunatic Jew-lover. All members of the government 
are condemned, even those who were deceived. The SS strives for justice and truth. Do NOT 
terrorize or attack without identifying the target! "The giant is known by his toe.” The same can 
be said of the urban guerrilla, who is known from afar by his correct tactics and his absolute 
fidelity to principle. The revolutionary method of carrying out actions is strongly and forcefully 
based on the knowledge and use of the following elements; 

1) Investigation and intelligence gathering 

2) Observation and vigilance 

3) Reconnaissance, or exploration of the terrain 

4) Study and timing of routes 

5) Mapping 

6) Mechanization 

7) Careful selection of personnel 

8) Selection of firepower 

9) Study and practice in success 

10) Success 

11) Use of cover 

12) Retreat 

13) Dispersal 

14) The liberation or transfer of prisoners 

15) The elimination of evidence 

16) The rescue of wounded 

34) SOME OBSERVATIONS ON TACTICS 

When there is no information, the point of departure for planning the action must be 
investigation, observation and vigilance. This method produces good results. In any event, even 
when there is information, it is essential to make observations to see that information is not at 
odds with observation or vice versa. Reconnaissance or exploration of the terrain and the study 
and timing of routes are so important that to omit them is to make a stab in the dark. 
Mechanization, in general, is an underestimated factor in the tactics of conducting an action. 



Frequently, mechanization is left to the end, on the eve of the action, before anything is done 
about it. This is a mistake. Mechanization must be seriously considered. It must be undertaken 
with considerable foresight and with careful planning, based on careful and precise information. 
The care, conservation, maintenance and camouflaging of stolen vehicles are very important 
details of mechanization. When transportation fails, the primary action fails, with serious 
material and morale problems for the urban guerrillas. The selection of personnel requires great 
care in order to avoid the inclusion of indecisive or wavering persons who present the danger of 
contaminating others, a danger that must be avoided. The withdrawal is equally or more 
important than the operation itself, to the point that it must be rigorously planned, including the 
possibility of defeat. One must avoid rescue or transfer of prisoners with children present, or 
anything to 

attract the attention of people passing through the area. The best thing is to make the rescue 
appear as natural as possible, winding through different routes or narrow streets that scarcely 
permit passage on foot, in order to avoid an encounter between two cars. The elimination of 
tracks is obligatory and demands the greatest caution—also in removing fingerprints and any 
other sign that could give the enemy information. Lack of care in the elimination of evidence is a 
factor that increases nervousness in our ranks, which the enemy often exploits. 

35) RESCUE OF THE WOUNDED 

The problem of the wounded in urban guerrilla warfare merits special attention. During guerrilla 
operations in the urban area, it may happen that some comrade is wounded by the police. When a 
guerrilla in the firing group has a knowledge of first aid, he can do something for the wounded 
comrade on the spot. Under no circumstances should the wounded guerrilla be abandoned at the 
site of the battle or left in the enemy's hands. One of the precautions we must take is to set up 
first-aid courses for men and women, courses in which guerrillas can learn the rudiments of 
emergency medicine. The urban guerrilla who is a doctor, nurse, med student, pharmacist or who 
simply has had first aid training is a necessity in modem guerrilla struggle. A small manual of 
first aid for urban guerrillas, printed on mimeographed sheets, can also be produced by anyone 
who has enough knowledge. In planning and carrying out an armed action, the urban guerrilla 
cannot forget the organization of medical support. This must be accomplished by means of a 
mobile or motorized clinic. You can also set up a mobile first aid station. Another solution is to 
utilize the skills of a medical comrade, who waits with his bag of equipment in a designated 
house to which the wounded are brought. The ideal would be to have our own well-equipped 
clinic, but this is very expensive unless we expropriate all of our materials. When all else fails, it 
is often necessary to resort to legal clinics, using armed force if necessary to force a doctor to 
treat our wounded. In the eventuality that we fall back upon blood banks to purchase blood or 
plasma, we must not use legal addresses and certainly no addresses where the wounded can 
really be found, since they are under our care and protection. Nor should we supply the addresses 
of those involved in the guerrilla organization to the hospitals and health care clinics where we 
may take them. Such caution is indispensable to covering our tracks. The houses in which the 
wounded stay cannot be known to anyone but the small group of comrades responsible for their 
care and transport. Sheets, bloody clothing, medicine and any other indications of treatment of 
comrades wounded in combat must be completely eliminated from any place they visit to receive 



treatment. 


36) GUERRILLA SECURITY 

The urban guerrilla lives in constant danger of the possibility of being discovered or denounced. 
The primary security problem is to make certain that we are well hidden and well-guarded, and 
that there are secure methods to keep the police from locating us. The worst enemy of the urban 
guerrilla, and the major danger that we run into, is infiltration into our organization by a spy or 
informer. The spy trapped within the organization will be punished with death. The same goes 
for those who desert and inform to the police. A well-laid security means there are no spies or 
agents infiltrated into our midst, and the enemy can receive no information about us even 
through indirect means. The fundamental way to insure this is to be strict and cautious in 
recruiting. Nor is it permissible for everyone to know everything and everyone. This rule is a 
fundamental ABC of urban guerrilla security. The enemy wants to annihilate us and fights 
relentlessly to find us and destroy us, so our greatest weapon lies in hiding from him and 
attacking by surprise. The danger to the urban guerrilla is that he may reveal himself through 
carelessness or allow himself to be discovered through a lack of vigilance. It is impermissible for 
the urban guerrilla to give out his own or any other clandestine address to the police, or to talk 
too much. Notations in the margins of newspapers, lost documents, calling cards, letters or notes, 
all these are evidence that the police never underestimate. Address and telephone books must be 
destroyed, and one must not write or hold any documents. It is necessary to avoid keeping 
archives of legal or illegal names, biographical information, maps or plans. Contact numbers 
should not be written down, but simply committed to memory. The urban guerrilla who violates 
these rules must be warned by the first one who notes this infraction and, if he repeats it, we 
must avoid working with him in the future. The urban guerrilla's need to move about constantly 
with the police nearby—given the fact that the police net surrounds the city—forces him to adopt 
various security precautions depending upon the enemy's movements. For this reason, it is 
necessary to maintain a daily information service about what the enemy appears to be doing, 
where the police net is operating and what points are being watched. The daily reading of the 
police news in the newspapers is a fountain of information in these cases. The most important 
lesson for guerrilla security is never, under any circumstances, to permit the slightest laxity in the 
maintenance of security measures and precautions within the organization. Guerrilla security 
must also be maintained in the case of an arrest. The arrested guerrilla must reveal nothing 
to the police that will jeopardize the organization. He must say nothing that will lead, as a 
consequence, to the arrest of other comrades, the discovery of addresses or hiding places, or the 
loss of weapons and ammunition. 

37) THE SEVEN SINS OF THE URBAN GUERRILLA 

Even when the urban guerrilla applies proper tactics and abides by its security rules, he can still 
be vulnerable to errors. There is no perfect urban guerrilla. The most he can do is make every 
effort to diminish the margin of error, since he cannot be perfect. One of the means we should 
use to diminish the possibility of error is to know thoroughly the seven deadly sins of the urban 
guerrilla and try to avoid them. The first sin of the guerrilla is inexperience. The urban guerrilla 
blinded by this sin, thinks the enemy is stupid, underestimates the enemy's intelligence, thinks 



everything is easy and, as a result, leaves evidence that can lead to disaster. Because of his 
inexperience, the urban guerrilla may also overestimate the forces of the enemy, believing them 
to be stronger than they really are. Allowing himself to be fooled by this presumption, the urban 
guerrilla becomes intimidated and remains insecure and indecisive, paralyzed and lacking in 
audacity. The second sin of the urban guerrilla is to boast about the actions he has undertaken 
and to broadcast them to the four winds. The third sin of the urban guerrilla is vanity. The 
guerrilla who suffers from this sin tries to solve the problems of the revolution by actions in the 
city, but without bothering about the beginnings and survival of other guerrillas in other areas. 
Blinded by success, he winds up organizing an action that he considers decisive and that puts 
into play the entire resources of the organization. Since we cannot afford to break the guerrilla 
struggle in the cities while rural guerrilla warfare has not yet erupted, we always run the risk of 
allowing the enemy to attack us with decisive blows. The fourth sin of the urban guerrilla is to 
exaggerate his strength and to undertake actions for which he, as yet, lacks sufficient forces and 
the required infrastructure. The fifth sin of the urban guerrilla is rash action. The guerrilla who 
commits this sin loses patience, suffers an attack of nerves, does not wait for anything, and 
impetuously throws himself into action, suffering untold defeats. The sixth sin of the urban 
guerrilla is to attack the enemy when they are most angry. The seventh sin of the urban guerrilla 
is to fail to plan things, and to act spontaneously. 

38) POPULAR SUPPORT 

One of the permanent concerns of the urban guerrilla is his identification with popular causes to 
win public support. Where government actions become inept and corrupt, the urban guerrilla 
should not hesitate to step in and show that he opposes the government, and thus gain popular 
sympathy. The present government, for example, imposes heavy financial burdens and 
excessively high taxes on the people. It is up to the urban guerrilla to attack the dictatorship's tax 
collection system and to obstruct its financial activities, throwing all the weight of armed action 
against it. The urban guerrilla fights not only to upset the tax collection system—the weapon of 
armed action must also be directed against those government agencies that raise prices and those 
who direct them as well as against the wealthiest of the national and foreign profiteers and the 
important property owners. In short, against all those who accumulate huge fortunes out of the 
high cost of living, the wages of hunger, excessive prices and high rents. Foreign industries, such 
as refrigeration and other North American plants that monopolize the market and the 
manufacture of general food supplies, must be systematically attacked by the urban guerrillas. 
The rebellion of the urban guerrilla and his persistence in intervening in political questions is the 
best way of insuring popular support for 

the cause which we defend. We repeat and insist on repeating—it is the way of insuring popular 
support. As soon as a reasonable portion of the population begins to take seriously the actions of 
the urban guerrilla, his success is guaranteed. The government has no alternative except to 
intensify its repression. The police networks, house searches, the arrest of suspects and innocent 
persons, and the closing off of streets make life in the city unbearable. The military dictatorship 
embarks on massive political persecution. Political assassinations and police terror become 
routine. In spite of all this, the police systematically fail. The armed forces, the navy and the air 
force are mobilized to undertake routine police functions, but even so they can find no way to 



halt guerrilla operations or to wipe out the revolutionary organization, with its fragmented groups 
that move around and operate throughout the country. The people refuse to collaborate with the 
government, and the general sentiment is that this government is unjust, incapable of solving 
problems, and that it resorts simply to the physical liquidation of its opponents30. The political 
situation in the country is transformed into a military situation in which the "gorillas" appear 
more and more to be the ones responsible for violence, while the lives of the people grow worse. 
When they see the military and the dictatorship on the brink of the abyss, and fearing the 
consequences of a civil war which is already well underway, the pacifiers (always to be found 
within the ruling elite) and the opportunists (partisans of nonviolent struggle) join hands and 
circulate rumors behind the scenes begging the hangmen for elections, "re-democratization", 
constitutional reforms, and other tripe designed to fool the people and make them stop the 
rebellion. But, watching the guerrillas, the people now understand that it is a farce to vote in any 
elections which have as their sole objective guaranteeing the survival of the dictatorship and 
covering up its crimes. Attacking wholeheartedly this election farce and the so-called "political 
solution", which is so appealing to the opportunists, the urban guerrillas must become even more 
aggressive and active, resorting without pause to sabotage, terrorism, expropriations, assaults, 
kidnappings, executions, etc. This action answers any attempt to fool the people with the opening 
of Congress and the reorganization of political parties—parties of the government and of the 
positions which the government allows—when all the time parliament and the so-called "parties" 
only function thanks to the permission of the military dictatorship, in a true spectacle of puppets 
or dogs on a leash. The role of the urban guerrilla, in order to win the support of the population, 
is to continue fighting, keeping in mind the interests of the people and heightening the disastrous 
situation within which the government must act. These are the conditions, harmful to the 
dictatorship, which permit the guerrillas to open rural warfare in the middle of an uncontrollable 
urban rebellion. 30 Note here the delusional assumption of popular support. The leftist worm 
crawls forth under the Jewish paradigm never pausing to let righteous actions drum up support. 
The main goal of the SS should be to seek virtue and learn. The urban guerrilla is engaged in 
revolutionary action for the people, and with them seeks the participation of the people in the 
struggle against the dictatorship and the liberation of the country. Beginning with the city and the 
support of the people, the rural guerrilla war develops rapidly, establishing its infrastructure 
carefully while the urban area continues the rebellion. 


II. Jihadist Training Manual 

The following are relevant (non-Koran based) excerpts from a training manual from the Islamic 
Jihadist Group "A1 Qaeda”, special care should be taken to avoid replication of the tactics 
involving religious zealotry and suicide bombing. These tactics are rarely effective and lead to a 
clouded mind which will result in poor battle decisions. The leadership is advised to only use 
religion to maintain order in the direst of circumstances, where perhaps men, on the brink of 
death, might reconnect with their religiosity regardless. Additionally, it should be considered 
that Muslims are our natural allies against the Jewish threat, care should be taken not to 
conform to alien ideologies, however cooperation and diplomacy is proven to be more effective 



than fighting private religious wars on the battlefield. The National Socialist is committed not to 
factionism but to the right for all peoples to have security for their nation and race, even if the 
recent Islamic invasion of Europe may result to mixed alliances and perspectives among the 
men. All Muslims who agree to join the war effort and fight for their own freedom against the 
international Jew and his terrorist allies should be treated as allies. Any Muslims claiming to 
have a birthright to European soil are traitors to their Volk and Nations and must be immediately 
expelled from any National Socialist military formation. Care should be taken to identify the use 
of Taqiyyah - religiously condoned lying, comparable to Jew pilpul - and alliances and 
communications clearly monitored if said member is a new recruit or has not yet been proven in 
battle with his allies (or blood brothers, in the case of Islamic National Socialist formations). 

As is the case with the prior manual, many of these tactics are 
outdated and should serve only as a reference point. 


Sanitized excerpts from the AQ Manual 

I) Principles of Military Organization 

Military Organization has three main principles without which it cannot be established. 

1) Military Organization commander and advisory council 

2) The soldiers (individual members) 

3) A clearly defined strategy 

Military Organization Requirements: 

The Military Organization dictates a number of requirements to assist it in confrontation and 
endurance. These are: 

1) Forged documents and counterfeit currency 

2) Apartments and hiding places 

3) Communication means 

4) Transportation means 

5) Information 

6) Arms and ammunition 

7) Transport 

Missions Required of the Military Organization: 

The main mission for which the Military Organization is responsible is: The overthrow of the 
godless regimes and their replacement with an Islamic regime. Other missions consist of the 
following: 

1) Gathering information about the enemy, the land, the installations, and the neighbors. 

2) Kidnapping enemy personnel, documents, secrets, and arms. 

3) Assassinating enemy personnel as well as foreign tourists. 

4) Freeing the brothers who are captured by the enemy. 

5) Spreading rumors and writing statements that instigate people against the enemy. 



6) Blasting and destroying the places of amusement, immorality, and sin; not a vital target. 

7) Blasting and destroying the embassies and attacking vital economic centers. 

8) Blasting and destroying bridges leading into and out of the cities. 

Importance of the Military Organization: 

1) Removal of those personalities that block the call's path. [A different handwriting:] All types 
of military and civilian intellectuals and thinkers for the state. 

2) Proper utilization of the individuals' unused capabilities. 

3) Precision in performing tasks, and using collective views on completing a job from all aspects, 
not just one. 

4) Controlling the work and not fragmenting it or deviating from it. 

5) Achieving long-term goals such as the establishment of an Islamic state and short-term goals 
such as operations against enemy individuals 

and sectors. 

6) Establishing the conditions for possible confrontation with the regressive regimes and their 
persistence. 

7) Achieving discipline in secrecy and through tasks. 

Financial Security Precautions: 

1) Dividing operational funds into two parts: One part is to be invested in projects that offer 
financial return, and the other is to be saved and not spent except during operations. 

2) Not placing operational funds [all] in one place. 

3) Not telling the Organization members about the location of the funds. 

4) Having proper protection while carrying large amounts of money. 

5) Leaving the money with non-members and spending it as needed. 

2) Forged Documents (Identity-Cards, Records Books, Passports) The following security 
precautions should be taken: 

1) Keeping the passport in a safe place so it would not be seized by the security apparatus, and 
the brother it belongs to would have to negotiate its return (I'll give you your passport if you give 
me information) 

2) All documents of the undercover brother, such as identity cards and passport, should be 
falsified. 

3) When the undercover brother is traveling with a certain identity card or passport, he should 
know all pertinent [information] such as the name, profession, and place of residence. 

4) The brother who has special work status (commander, communication link,...) should have 
more than one identity card and passport. He should learn the contents of each, the nature of the 
[indicated] profession, and the dialect of the 

residence area listed in the document. 

5) The photograph of the brother in these documents should be without a beard. It is preferable 
that the brother's public photograph [on these documents] be also without a beard. If he already 
has one [document] showing a photograph with a beard, he should replace it. 

6) When using an identity document in different names, no more than one such document should 



be carried at one time. 

7) The validity of the falsified travel documents should always be confirmed. 

8) All falsification matters should be carried out through the command and not haphazardly 
(procedure control) 

9) Married brothers should not add their wives to their passports. 

10) When a brother is carrying the forged passport of a certain country, he should not travel to 
that country. It is easy to detect forgery at the airport, and the dialect of the brother is different 
from that of the people from that country. 

Security Precautions Related to the Organizations' Given Names: 

1) The name given by the Organization [to the brother] should not be odd in comparison with 
other names used around him. 

2) A brother should not have more than one name in the area where he lives {the undercover 
work place) 

3) FOURTH LESSON - Organization MILITARY BASES 
"APARTMENTS PLACES" - HIDING 

Definition of Bases: 

These are apartments, hiding places, command centers, etc. in which secret operations are 
executed against the enemy. These bases may be in cities and are [then] called homes or 
apartments. They may be in mountainous, harsh terrain far from the enemy, and are [then] called 
hiding places or bases. During the initial stages, the Military Organization usually uses 
apartments in cities as places for launching assigned missions, such as collecting information, 
observing members of the ruling regime, etc. Hiding places and bases in mountains and harsh 
terrain are used at later stages, from which Jihad [holy war] groups are dispatched to execute 
assassination operations of enemy individuals, bomb their centers, and capture their weapons. In 
some Arab countries such as Egypt, where there are no mountains or harsh terrain, all stages of 
Jihad work would take place in cities. The opposite was true in Afghanistan, where initially Jihad 
work was in the cities, then the warriors shifted to mountains and harsh terrain. There, they 
started battling the Communists. 

Security Precautions Related to Apartments: 

1) Choosing the apartment carefully as far as the location, the size for the work necessary 
(meetings, storage, arms, fugitives, work preparation). 

2) It is preferable to rent apartments on the ground floor to facilitate escape and digging of 
trenches. 

3) Preparing secret locations in the apartment for securing documents, records, arms, and other 
important items. 

4) Preparing ways of vacating the apartment in case of a surprise attack (stands, wooden 
ladders). 

5) Under no circumstances should anyone know about the apartment except those who use it. 

6) Providing the necessary cover for the people who frequent the apartment (students, workers, 
employees, etc.) 



7) Avoiding seclusion and isolation from the population and refraining from going to the 
apartment at suspicious times. 

8) It is preferable to rent these apartments using false names, appropriate cover, and non-Moslem 
appearance. 

9) A single brother should not rent more than one apartment in the same area, from the same 
agent, or using the same rental office. 

10) Care should be exercised not to rent apartments that are known to the security apparatus 
[such as] those used for immoral or prior Jihad activities. 

11) Avoiding police stations and government buildings. Apartments should not be rented near 
those places. 

12) When renting these apartments, one should avoid isolated or deserted locations, so the enemy 
would not be able to catch those living there easily. 

13) It is preferable to rent apartments in newly developed areas where people do not know one 
another. Usually, in older quarters people know one another and strangers are easily identified, 
especially since these quarters have many informers. 

14) Ensuring that there is has been no surveillance prior to the members entering the apartment. 

15) Agreement among those living in the apartment on special ways of knocking on the door and 
special signs prior to entry into the building’s main gate to indicate to those who wish to enter 
that the place is safe and not being monitored. Such signs include hanging out a towel, opening a 
curtain, placing a cushion in a special way, etc. 

16) If there is a telephone in the apartment, calls should be answered in an agreed-upon manner 
among those who use the apartment. That would prevent mistakes that would, otherwise, lead to 
revealing the names and nature of the occupants. 

17) For apartments, replacing the locks and keys with new ones. As for the other entities (camps, 
shops, mosques), appropriate security precautions should be taken depending on the entity’s 
importance and role in the work. 

18) Apartments used for undercover work should not be visible from higher apartments in order 
not to expose the nature of the work. 

19) In a newer apartment, avoid talking loud because prefabricated ceilings and walls [used in 
the apartments] do not have the same thickness as those in old ones. 

20) It is necessary to have at hand documents supporting the undercover [member]. In the case of 
a physician, there should be an actual medical diploma, membership in the [medical] union, the 
government permit, and the rest of the routine procedures known in that country. 

21) The cover should blend well [with the environment]. For example, selecting a doctor’s clinic 
in an area where there are clinics, or in a location suitable for it. 

22) The cover of those who frequent the location should match the cover of that location. For 
example, a common laborer should not enter a fancy hotel because that would be suspicious and 
draw attention. 


4) FIFTH LESSON - MEANS OF COMMUNICATION AND 
TRANSPORTATION 

In the name of Allah, the merciful and compassionate 



Means of Transportation 
Introduction: 

It is well known that in undercover operations, communication is the mainstay of the movement 
for rapid accomplishment. However, it is a double-edged sword: It can be to our advantage if we 
use it well and it can be a knife dug into our back if we do not consider and take the necessary 
security measures. 

Communication Means: 

The Military Organization in any Islamic group can, with its modest capabilities, 
use the following means: 

1) The telephone, 

2) Meeting in-person, 

3) Messenger, 

4) Letters, 

5) Some modem devices, such as the facsimile and wireless [communication]. 

Communication may be within the county, state, or even the country, in which case it is called 
local communication. When it extends expanded between countries, it is then called international 
communication. 

Secret Communication is Limited to the Following Types: 

Common, standby, alarm 

1) Common Communication: It is a communication between two members of the Organization 
without being monitored by the security apparatus opposing the Organization. The common 
communication should be done under a certain cover and after inspecting the surveillance 
situation [by the enemy], 

2) Standby Communication: This replaces common communication when one of the two parties 
is unable to communicate with the other for some reason. 

3) Alarm Communication: This is used when the opposing security apparatus discovers an 
undercover activity or some undercover members. Based on this communication, the activity is 
stopped 'for a while, all matters related to the activity are abandoned, and the Organization's 
members are hidden from the security personnel. 

Method of Communication Among Members of the Organization: 

1) Communication about undercover activity should be done using a good cover; it should also 
be quick, explicit, and pertinent. That is, just for talking only. 

2) Prior to contacting his members, the commander of the cell [2] should agree with each of them 
separately (the cell members should never meet all in one place and should not know one 
another) on a manner and means of communication with each other. Likewise, the chief of the 
Organization should [use a similar technique] with the branch commanders. 

3) A higher-ranking commander determines the type and method of communication with lower- 
ranking leaders. 

First Means: The Telephone: 

Because of significant technological advances, security measures for monitoring the telephone 



and broadcasting equipment have increased. Monitoring may be done by installing a secondary 
line or wireless broadcasting device on a telephone that relays the calls to a remote 
location.. .That is why the Organization takes security measures among its members who use this 
means of communication (the telephone). 

1) Communication should be carried out from public places. One should select telephones that 
are less suspicious to the security apparatus and are more difficult to monitor. It is preferable to 
use telephones in booths and on main streets. 

[2)] Cell or cluster methods should be adopted by the Organization. It should be composed of 
many cells whose members do not know one another, so that if a cell member is caught the other 
cells would not be affected, and work would proceed normally. 

2) Conversation should be coded or in general terms so as not to alert the person monitoring [the 
telephone]. 

3) Periodically examining the telephone wire and the receiver. 

4) Telephone numbers should be memorized and not recorded. If the brother has to write them, 
he should do so using a code, so they do not appear as telephone numbers (figures from a 
shopping list, etc.) 

5) The telephone caller and person called should mention some words or sentences prior to 
bringing up the intended subject. The brother who is calling may misdial one of the digits and 
actually call someone else. The person ‘called may claim that the call is for him, and the calling 
brother may start telling him work-related issues and reveal many things because of a minor 
error. 

6) In telephone conversations about undercover work, the voice should be changed and distorted. 

7) When feasible, it is preferable to change telephone lines to allow direct access to local and 
international calls. That and proper cover facilitate communications and provide security 
protection not available when the central telephone station in the presence of many employees is 
used. 

8) When a telephone [line] is identified [by the security apparatus], the command and all parties 
who were using it should be notified as soon as possible in order to take appropriate measures. 

9) When the command is certain that a particular telephone [line] is being monitored, it can 
exploit it by providing information that misleads the enemy and benefits the work plan. 

10) If the Organization manages to obtain jamming devices, it should use them immediately. 

Second Means: Meeting in-person: 'A 

This is direct communication between the commander and a member of the Organization. During 
the meeting the following are accomplished: 

1) Information exchange, 

2) Giving orders and instructions, 

3) Financing, 

4) Member follow-up 

Stages of the In-Person Meeting: 

A) Before the meeting, 

B) The meeting [itself], 



C) After the meeting 


A. Before the Meeting: 

The following measures should be taken: 

1) Designating the meeting location, 

2) Finding a proper cover for the meeting, 

3) Specifying the meeting date and time, 

4) Defining special signals between those who meet. 

1) Identifying the meeting location 

If the meeting location is stationary, the following matters should be observed: 

i) The location should be far from police stations and security centers. 

ii) Ease of transportation to the location. 

iii) Selecting the location prior to the meeting and learning all its details. 

iv) If the meeting location is an apartment, it should not be the first one, but one somewhere in 
the middle. 

v) The availability of many roads leading to the meeting location. That would provide easy 
escape in case the location ware raided by security personnel. 

vi) The location should not be under suspicion (by the security [apparatus]) 

vii) The apartment where the meeting takes place should be on the ground floor, to facilitate 
escape. 

Viii) The ability to detect any surveillance from that location. 

ix) When public transportation is used, one should alight at some distance from the meeting 
location and continue on foot. In the case of a private vehicle, one should park it far away or in a 
secure place so as to be able to maneuver it quickly at any time. 

If the meeting location is not stationary, the following matters should be 
observed: 

i ) The meeting location should be at the intersection of a large number of main and side streets to 
facilitate entry, exit, and escape. 

ii) The meeting location (such as a coffee shop) should not have members that might be dealing 
with the security apparatus. 

iii) The meeting should not be held in a crowded place because that would allow the security 
personnel to hide and monitor those who meet. 

iv) It is imperative to agree on an alternative location for the meeting in case meeting in the first 
is unfeasible. That holds whether the meeting place is stationary or not. 

Those who meet in-person should do the following: 

i) Verifying the security situation of the location before the meeting. 

ii) Ensuring that there are no security personnel behind them or at the meeting place. 

iii) Not heading to the location directly. 

iv) Clothing and appearance should be appropriate for the meeting location. 

v) Verifying that private documents carried by the brother have appropriate cover. 



vi) Prior to the meeting, designing a security plan that specifies what the security personnel 
would he told in case the location were raided by them, and what [the brothers] would resort to 
in dealing with the security personnel (fleeing, driving back ,...) 

2) Finding a proper cover for the meeting [The cover| 

i) should blend well with the nature of the location. 

ii) In case they raid the place, the security personnel should believe the cover. 

iii) should not arouse the curiosity of those present. 

iv) should match the person's appearance and his financial and educational background. 

v) should have documents that support it. 

vi) provide reasons for the two parties' meeting (for example, one of the two parties should have 
proof that he is an architect. The other should have documents as proof that he is a land owner. 
The architect has produced a construction plan for the land) 

3) Specifying the Meeting Date and Time 

i) Specifying the hour of the meeting as well as the date. 

ii) Specifying the time of both parties' arrival ana the time of the first party's departure. 

iii) Specifying how long the meeting will last. 

iv) Specifying an alternative date and time. 

v) Not allowing a long period of time between making the meeting arrangements and the 
meeting itself. 

4) Designating special signals between those who meet 

If the two individuals meeting know one another's shape and appearance, it is sufficient to use a 
single safety sign. [In that case,] the sitting and arriving individuals inform each other that there 
is no enemy surveillance. The sign may be 

keys, beads, a newspaper, or a scarf. The two parties would agree on moving it in a special way 
so as not to attract the attention of those present. If the two individuals do not know one another, 
they should do the following: 

a) The initial sign for becoming acquainted may be that both of them wear a certain type of 
clothing or carry a certain item. These signs should be appropriate for the place, easily identified, 
and meet the purpose. The initial sign 

for becoming acquainted does not [fully] identify one person by another. It does that at a rate of 
30%. 

b) Safety Signal: It is given by the individual sitting in. the meeting location to inform the 
second individual that the place is safe. The second person would reply through signals to inform 
the first that he is not being monitored. The signals are agreed upon previously and should not 
cause suspicion. 

c) A second signal for getting acquainted is one in which the arriving person uses while sitting 
down. That signal may be a certain clause, a word, a sentence, or a gesture agreed upon 
previously, and should not cause suspicion for those who hear it or see it. 



B. The Stage of the Meeting [itself] 

The following measures should be taken: 

1) Caution during the meeting. 

2) Not acting unnaturally during the meeting in order not to raise suspicion. 

3) Not talking with either loud or very low voices ([should be] moderate). 

4) Not writing anything that has to do with the meeting. 

5) Agreeing on a security plan in case the enemy raids the location. 

C. After the Meeting 

The following measures should be taken: 

1) Not departing together, but each one separately. 

2) Not heading directly to the main road but through secondary ones. 

3) Not leaving anything in the meeting place that might indicate the identity or nature of those 
who met. Meeting in-person has disadvantages, such as: 

1) Allowing the enemy to capture those who are meeting. 

2) Allowing them [the enemy] to take pictures of those who are meeting, record their 
conversation, and gather evidence against them. 

3) Revealing the appearance of the commander to the other person. However, that may be 
avoided by taking the previously mentioned measures such 

as disguising himself well and changing his appearance (glasses, wig, etc.) 

Third Means: The Messenger: 

This is an intermediary between the sender and the receiver. The messenger should possess all 
characteristics mentioned in the first chapter regarding the Military Organization’s member. 
These are the security measures that a messenger should take: 

1) Knowledge of the person to whom he will deliver the message. 

2) Agreement on special signals, exact date, and specific time. 

3) Selecting a public street or place that does not raise suspicion. 

4) Going through a secondary road that does not have check points. 

5) Using public transportation (train, bus,...) and disembarking before the main station. 
Likewise, embarking should not be done at the main station either, were there are a lot of 
security personnel and informants. 

6) Complete knowledge of the location to which he is going. 

Fourth Means: Letters: 

This means (letters) may be used as a method of communication between 
members and the Organization provided that the following security measures are 
taken: 

1) It is forbidden to write any secret information in the letter. If one must do so, the writing 
should be done in general terms. 

2) The letter should not be mailed from a post office close to the sender's residence, but from a 
distant one. 



3) The letter should not be sent directly to the receiver's address but to an inconspicuous location 
where there are many workers from your country. 

Afterwards, the letter will be forwarded to the intended receiver. (This is regarding the overseas- 
bound letter). 

4) The sender's name and address on the envelope should be fictitious. In case the letters and 
their contents are discovered, the security apparatus would not be able to determine his [the 
sender's] name and address. 

5) The envelope should not be transparent so as to reveal the letter inside. 

6) The enclosed pages should not be many, so as not to raise suspicion. 

7) The receiver's address should be written clearly so that the letter would not be returned. 

8) Paying the post office box fees should not be forgotten. 

Fifth Means: Facsimile and Wireless: 

Considering its modest capabilities and the pursuit by the security apparatus of its members and 
forces, the Islamic Military Organization cannot obtain these devices. In case the Organization is 
able to obtain them, firm security measures 

should be taken to secure communication between the members in the country and the command 
outside. These measures are: 

1) The duration of transmission should not exceed five minutes in order to prevent the enemy 
from pinpointing the device location. 

2) The device should be placed in a location with high wireless frequency, such as close to a TV 
station, embassies, and consulates in order to prevent the enemy from identifying its location. 

3) The brother, using the wireless device to contact his command outside the country, should 
disguise his voice. 

4) The time of communication should be carefully specified. 

5) The frequency should be changed from time to time. 

6) The device should be frequently moved from one location to another. 

7) Do not reveal your location to the entity for which you report. 

8) The conversation should be in general terms so as not to raise suspicion. 

Transportation Means: 

The members of the Organization may move from one location to another using 
one of the following means: 

a) Public transportation, 

b) Private transportation 

Security Measures that Should be Observed in Public 
Transportation: 

1) One should select public transportation that is not subject to frequent checking along the way, 
such as crowded trains or public buses. 

2) Boarding should be done at a secondary station, as main stations undergo more careful 
surveillance. Likewise, embarkment should not be done at main stations. 

3) The cover should match the general appearance (tourist bus, first-class train, second-class 



train, etc.). 

4) The existence of documents supporting the cover. 

5) Placing important luggage among the passengers' luggage without identifying the one who 
placed it. If it is discovered, its owner would not be arrested. In trains, it [the luggage] should be 
placed in a different car than that of its owner. 

6) The brother traveling on a "special mission" should not get involved in religious issues 
(advocating good and denouncing evil) or day-to-day matters (seat reservation). The brother 
traveling on a mission should not arrive in the [destination] country at night because then 
travelers are few, and there are [search] parties and check points along the way. 

7) 

8) When cabs are used, conversation of any kind should not be started with the driver because 
many cab drivers work for the security apparatus. 

9) The brother should exercise extreme caution and apply all security measures to the members. 

Security Measures that Should be Observed in Private Transportation: 

Private transportation includes: cars, motorcycles 

A) Cars and motorcycles used in overt activity: 

1) One should possess the proper permit and not violate traffic rules in order to avoid trouble 
with the police. 

2) The location of the vehicle should be secure so that the security apparatus would not 
confiscate it. 

3) The vehicle make and model should be appropriate for the brother’s cover. 

4) The vehicle should not be used in special military operations unless the Organization has no 
other choice. 

B) Cars and motorcycles used in covert activity: 

1) Attention should be given to permits and [obeying] the traffic rules in order to avoid trouble 
and reveal their actual mission. 

2) The vehicle should not be left in suspicious places (deserts, mountains, etc.). If it must be, 
then the work should be performed at suitable times when no one would keep close watch or 
follow it. 

3) The vehicle should be purchased using forged documents so that getting to its owners would 
be prevented once it is discovered. 

4) For the sake of continuity, have only one brother in charge of selling. 

5) While parking somewhere, one should be in a position to move quickly and flee in case of 
danger. 

6) The car or motorcycle color should be changed before the operation and returned to the 
original after the operation. 

7) The license plate number and county name should be falsified. Further, the digits should be 
numerous in order to prevent anyone from spotting and memorizing it. 

8) The operation vehicle should not be taken to large gasoline stations so that it would not be 
detected by the security apparatus. 


5) SIXTH LESSON - TRAINING 



The following security precautions should be taken during the training: 

The Place 

The place should have the following specifications: 

1) Distance from the populated areas with the availability of living necessities. 

2) Availability of medical services during the training. 

3) The place should be suitable for the type of training (physical fitness, shooting, tactics). 

4) No one except the trainers and trainees should know about the place. 

5) The place should have many roads and entrances. 

6) The place should be visited at suitable times. 

7) Hiding any training traces immediately after the training. 

8) Guarding the place during the training. 

9) Appropriateness of the existing facilities for the number of training members. 

10) Exclusion of anyone who is not connected with the training. 

11) Taking all security measures regarding the establishment. 

12) Distance of the place from police stations, public establishments, and the eyes of informants. 

13) The place should not be situated in such a way that the training and trainees can be seen from 
another location. 

The Trainees: 

1) Before proceeding to the training place, all security measures connected with an undercover 
individual should be taken. Meanwhile, during training at the place, personnel safety should be 
ensured. 

2) Selecting the trainees carefully. 

3) The trainees should not know one another. 

4) The small size of groups that should be together during the training (7-10 individuals). 

5) The trainees should not know the training place. 

6) Establishing a training plan for each trainee. 

The Trainers: 

All measures taken with regard to the commanders apply also to the trainers. Also, the following 
should be applied: 

1) Fewness of the trainers in the training place. Only those conducting the training should be 
there, in order not to subject the training team to the risk of security exposure. 

2) Not revealing the identity of the trainer to trainees. 

3) Keeping a small ratio of trainees to trainer. 

4) The training team members should not know one another. 

6) SEVENTH LESSON - WEAPONS: MEASURES RELATED TO 
BUYING AND TRANSPORTING THEM 

Prior to dealing with weapons, whether buying, transporting, or storing them, it is essential to 
establish a careful, systematic and firm security plan that plan deals with all stages. It is 
necessary to divide that task into stages: 



First Stage: Prior to Purchase; 


Second Stage: Purchasing; 

Third Stage: Transport; 

Fourth Stage: Storage. 

1) Prior to Purchase Stage 

It is necessary to take the following measures: 

a) In-depth knowledge of the place where weapons will be purchased, together with its entrances 
and exits. 

b) Verifying there are no informants or security personnel at the place where purchasing will 
take place. 

c) The place should be far from police stations and government establishments. 

d) Not proceeding to the purchasing place directly by the main road, but on secondary streets. 

e) Performing the exercises to detect the surveillance. 

f) One’s appearance and clothing should be appropriate for the place where purchasing will take 
place. 

g) The purchasing place should not be situated in such a way that the seller and buyer can be 
seen from another location. To the contrary, the purchasing place should be such that the seller 
and buyer can see the surrounding area. 

h) Determining a suitable cover for being in that place. 

i) The place should not be crowded because that would facilitate the police hiding among people, 
monitoring the arms receiving, and consequently arresting the brother purchasing. 

j) In case one of the parties is unable to arrive, it is essential to prearrange an alternative place 
and time with the seller. 

k) Selecting a time suitable for the purchase so that it does not raise suspicion. 

l) Prior to purchasing, the seller should be tested to ensure that he is not an agent of the security 
apparatus. 

m) Preparing a place for storage prior to purchasing. 

2) The Purchase Stage 

a) Verifying that the weapons are in working condition. 

b) Not paying the seller the price for the weapons before viewing, inspecting, and testing them. 

c) Not telling the seller about the mission for which the weapons are being purchased. 

d) Extreme caution should be used during the purchasing operation in the event of any unnatural 
behavior by the seller or those around you. 

e) Not lengthening the time spent with the seller. It is important to depart immediately after 
purchasing the weapons. 

3) The Transport Stage 

a) Avoid main roads where check points are common. 



b) Choose a suitable time for transporting the weapons. 

c) Observers should proceed on the road ahead of the transportation vehicle for early warning in 
case of an emergency. 

d) Not proceeding directly to the storage place until after verifying there is no surveillance. 

e) During the transport stage, weapons should be hidden in a way that they are inconspicuous 
and difficult to find. 

f) The route for transporting the weapons should be determined very carefully. 

g) Verifying the legality of the vehicle, performing its maintenance, checking its gasoline and 
water levels, etc. 

h) Driving the car normally in order to prevent accidents. 

4) The Storage Stage 

a) In order to avoid repeated transporting, suitable storage places should be selected. In case the 
materials are bombs or detonators, they should be protected from extreme heat and humidity. 

b) Explosive materials and detonators should be separated and stored apart from each other. 

c) Caution should be exercised when putting detonators in the arsenal. 

d) Lubricating the weapons and placing them in wooden or plastic crates. 

The ammunition should be treated likewise. When selecting an arsenal, consider the following: 

1) The arsenal should not be in well-protected areas, or close to parks or public places. 

2) The arsenal should not be in a "no-man's-land." 

3) The arsenal should not be in an apartment previously used for suspicious activities and often 
frequented by security personnel. 

4) The arsenal should not be a room that is constantly used and cannot be given up by family 
members who do not know the nature of the father or husband's work. 

5) The apartment selected as an arsenal should be owned by the Organization or rented on a 
long-term basis. 

6) The brother responsible for storage should not visit the arsenal frequently, nor toy with the 
weapons. 

7) The arsenal keeper should record in a book all weapons, explosive materials, and ammunition. 
That book should be coded and well secured. 

8) Only the arsenal keeper and the commander should know the location of the arsenal. 

9) It is necessary to prepare alternative arsenals and not leave any leads in the original arsenals to 
the alternative ones. 

7) EIGHT LESSON- MEMBER SAFETY 
Defining Members Safety: 

This is a set of measures taken by members who perform undercover missions in order to prevent 
the enemies from getting to them. It is necessary for any party that has many members to 
subdivide its members into three groups, each of which has its own security measures. The three 
groups are: 

1) The overt member, 

2) The covert member, 



3) The commander. 


Measures that Should be Taken by the Overt Member: 

1) He should not be curious and inquisitive about matters that do not concern him. 

2) He should not be chatty and talkative about everything he knows or hears. 

3) He should not carry on him the names and addresses of those members he knows. If he has to, 
he should keep them safe. 

4) During times of security concerns and arrest campaigns and especially if his appearance is 
Islamic, he should reduce his visits to the areas of trouble and remain at home instead. 

5) When conversing on the telephone, he should not talk about any information that might be of 
use to the enemy. 

6) When sending letters, he should not mention any information that might be of use to the 
enemy. When receiving letters, he should burn them immediately after reading them and pour 
water on them to prevent the enemy from reading them. Further, he should destroy any traces of 
fire so the enemy would not find out that something was burned. 

Measures that Should be Taken by the Undercover Member: 

In addition to the above measures, the member should... 

1) Not reveal his true name to the Organization's members who are working with him, nor to the 
[Islamic] Da'wa [Call], 

2) Have a general appearance that does not indicate Islamic orientation (beard, toothpick, book, 
[long] shirt, small Koran). 

3) Be careful not to mention the brothers' common expressions or show their behaviors (special 
praying appearance, ''may Allah reward you", "peace be on you" while arriving and departing, 
etc.) 

4) Avoid visiting famous Islamic places (mosques, libraries, Islamic fairs, etc.) Carry falsified 
personal documents and know all the information they contain. 

5) 

6 ) 

7) 

8) 

9) Not resort to utilizing letters and messengers except in an emergency. Have protection 
preceding his visit to any place while moving about (apartment, province, means of 
transportation, etc.). Have complete and accurate knowledge of the security status related to 
those around him in his place of work and residence, so that no danger or harm would catch him 
unaware. Maintain his family and neighborhood relationships and should not show any changes 
towards them so that they would not attempt to bring him back [from the Organization] for 
security reasons. 

10) Not speak loudly. 

11) Not get involved in advocating good and denouncing evil in order not to attract attention to 
himself. 

12) Break the daily routine, especially when performing an undercover mission. For example, 
changing the departure and return routes, arrival and departure times, and the store where he 



buys his goods. 

13) Not causing any trouble in the neighborhood where he lives or at the place of work. 

14) Converse on the telephone using special code so that he does not attract attention. 

15) Not contacting the overt members except when necessary. Such contacts should be brief. 

16) Not fall into the enemy's excitement trap, either through praising or criticizing his 
Organization. 

17) Performing the exercises to detect surveillance whenever a task is to be performed. 

18) Not park in no-parking zones and not take photographs where it is forbidden. 

19) Closing all that should be closed before departing the place, whether at home or his place of 
undercover work. 

20) Not undergo a sudden change in his daily routine or any relationships that precede his Jihad 
involvement. For example, there should not be an obvious change in his habits of conversing, 
movement, presence, or disappearance. Likewise, he should not be hasty to sever his previous 
relationships. 

21) Not meet in places where there are informers, such as coffee shops, and not live in areas 
close to the residences of important personalities, government establishments, and police 
stations. 

22) Not write down on any media, especially on paper, that could show the traces and words of 
the pen by rubbing the paper with lead powder. 

Measures that Should be Taken by the Commander: 

The commander, whether in overt or covert work, has special importance for the following 
reasons: 

1) The large amount of information that he possesses. 

2) The difficulty of the command in replacing the commander. 

3) Therefore, all previously mentioned security precautions regarding members should be 
heightened for the commander. Many resources should be reserved for protecting the 
commanders. 

Importance of Information: 

1) Based on the enemy's up-to-date information, his capabilities, and plans, the Organization's 
command can design good-quality and secure plans. [7] Abdullah Ali Al-Salama: Military 
Espionage in Islam, pp. 253- 258. 

2) Information about the enemy's intention provides early warning signs for the command, which 
in turn makes appropriate preparation and thwarts the enemy's opportunity. 

3) Information benefits the Organization's command by providing information about the enemy's 
strengths and weaknesses. 

4) Information benefits the Organization's command by providing information about movements 
of the enemy and his members. 

Information requirements include: 

Newness, Trustworthiness, Forthcoming, security, and confirmation. General Mahmoud Sheet 
Khattab said, "The nation that wants to achieve victory over its enemy must know that enemy 



very well. It also must know the site of the battle in detail. Those who fight an enemy that they 
do not know, do not win because a successful military plan must be built on clear and 
trustworthy information. The commander who fights an enemy and does not know his strength 
(number and material) is blind and destined to fail and fall. 

Information Sources: 

Any organization that desires to raise the flag of Islam high and proud, must gather as much 
information as possible about the enemy. Information has two sources: 

1) Public Source: Using this public source openly and without resorting to illegal means, it is 
possible to gather at least 80% of information about the enemy. The percentage varies 
depending on the government's policy on freedom of the press and publication. It is possible to 
gather information through newspapers, magazines, books, periodicals, official publications, and 
enemy broadcasts. Attention should also be given to the opinion, comments, and jokes of 
common people. Truman, a past American President, said, "We attribute our great advance to 
our press, because it gives America's enemies the capability of learning what we have not 
officially publicized about our plans and even our establishments." In 1954, Allan Dulles [PH], 
Director of American Intelligence [CIA], said, "I am ready to pay any amount of money to 
obtain information about the Soviet Union, even as little as what the Soviet Union obtains by 
simply reading American newspapers." The one gathering public information should be a regular 
person (trained college graduate) who examines primary sources of information published by the 
enemy (newspapers, magazines, radio, TV, etc.). He should search for information directly 
related to the topic in question. The one gathering information with this public method is not 
exposed to any danger whatsoever. Any brother can gather information from those 
aforementioned sources. We cannot label that brother a "Moslem Spy" because he does not make 
any effort to obtain unpublished and covert information. 

2) Secret Sources: It is possible, through these secret and dangerous methods, to obtain the 20% 
of information that is considered secret. The most important of these sources are: 

A. Individuals who are recruited as either volunteers or because of other motives 

B. Recording and monitoring 

C. Photography 

D. Interrogation 

E. Documents: By burglary or recruitment of personnel 

F. Drugging 

G. Surveillance, spying, and observation 

Information Gathering Using Public Means: 

A. Newspapers, Magazines, and Official and Party Publications: 

In order to gather enemy information, the Military Organization can use means such as 
magazines, publications, periodicals, and official printed matter. Through these means, it is 
possible to leam about major government events and about the news, meetings, and travel of 
Presidents, ministers, and commanders. Information may be: 



1) Names and photographs of important government personalities, police commanders, and 
security leaders. 

2) Published meetings. Through these, one can learn about major decisions and topics being 
discussed. 

3) Future meeting plans. 

4) Present and future enemy capabilities through current photographs of projects and strategic 
sites or through meetings with top officials. 

5) Beneficial news about the enemy's diplomacy and its present and future plans. 

6) Tourism news and the arrival times of foreign tourist group 

7) Advertisements about apartments for rent, vacant positions, or anything else that is useful. 

8) Advertisements about new and used car lots. These may be used in assassination, kidnaping, 
and overthrowing the government. 

9) Learning the enemy position on current Islamic issues (veil, beard, dedication. Jihad). 

B. Radio and Television: 

The Military organization can use these important public sources to gather information all day 
and night. The importance of these means is explained below. 

1) Visual and audible news help the Organization to determine its present and future plans. 

2) Interviews may help to identify the government policy and its general directives. 

3) Spotting the appearance of those who occupy high positions. 

4) Learning the prevailing information diplomacy and its position on contemporary issues. 

5) Learning about the interior of important government places and establishments during their 
opening ceremonies or through advertisements. In addition to the aforementioned, [attention 
should be given] to newspapers, magazines, and the public's comments and jokes. 


8) TWELFTH LESSON - ESPIONAGE 
INFORMATION-GATHERING USING COVERT METHODS 

Information needed through covert means: Information needed to be gathered through covert 
means is of only two types: 

First: Information about government personnel, officers, important personalities, and all matters 
related to those (residence, work place, times of leaving and returning, wives and children, places 
visited) 

Second: Information about strategic buildings, important establishments, and military bases. 
Examples are important ministries such as those of Defense and Internal Security, airports, 
seaports, land border points, embassies, and radio and TV stations. 

General security measures that should be taken by the person gathering information: 

During the process of gathering information, whether about governing personalities or 
establishments, the person doing the gathering must take the following security measures: 


1) Performing the exercises to detect surveillance while executing the mission. These exercises 
are not well defined, but are dependent on the time, place, and the ability to be creative. These 



exercises include the following: 

a) 

b) 

c) 

d) 

e) Walking down a dead-end street and observing who is walking behind you. Beware of traps. 
Casually dropping something out of your pocket and observing who will pick it up. Walking fast 
then stopping suddenly at a comer and observing who will be affected. Stopping in front of store 
windows and observing who is-watching you. Getting on a bus and then getting off after it 
departs and observing who will be affected. 

f) Agreeing with one of your brothers to look for whoever is watching you. 

2) When receiving the gathered information, let the informants travel as far as possible from 
their place of residence and yours. Let each of them get there using secondary roads, preferably 
at night. 

3) Gather what information you can without emphasizing any particular part. Do not rush or 
show urgency because your excitement may uncover you and the degree of importance of the 
information. 

4) Avoid anything that reveals your identity quickly. Do not attempt to he too creative or 
inventive. Remember what Taliran [PHI] said to his political emissaries, "Do not be anxious.” 

5) Move slowly and travel a great distance. The one who is successful in gathering information is 
the one who is not known or conspicuous. 

6) Do not accept events at their face value. Do not overlook a quick friendship or an apparent 
dispute. Evaluate the importance of events and do not judge them by their appearance. 

7) Do not speak vaguely or act mysteriously except when wanting to get a "blabber mouth" to 
talk about what he knows. 

8) Carry personal credentials and know all their contents. 

9) Prior to collecting the information, make sure that all necessities related to the mission, 
especially money, are ready. 

10) Study the area where information-gathering takes place carefully: Open and closed streets, 
residents' customs, ways of dressing, and accent. 

11) It is not permitted to carry any weapons during the information gathering process. 

12) Finding a cover prior to gathering the information. Further, review all security measures 
concerning members of the Military [Organization] which are covered in prior lessons. 

Methods of Gathering Information Using Covert Means: 

The Military Organization may obtain secret information using: 

A. Surveillance, intelligence, and observation; 

B. Theft: 

C. Interrogation; 

D. Excitement; 

E. Drugging; 



F. Recruitment. 

A. Surveillance, Intelligence, and Observation: Civilian and military targets (personalities). The 
monitoring may be done on foot or by car. 


Surveillance on foot: 

1) The brother or brothers performing the surveillance operation on foot study the available 
information about the target (height, weight, way of walking, looking at a recent photograph) 

2) Knowing the target's habits, places he visits, and communications 

3) Studying carefully the area where observation will take place: names of through and dead-end 
streets, residents' habits and way of dressing. 

4) Prior to the start of the surveillance mission, making sure that all needs related to the mission, 
especially money, are met. 

5) Agreeing on how communications with the leaders will take place in case the surveillance 
plan is uncovered (telephone, a person used for that purpose). The telephone number should not 
be written but memorized. 

6) Agreeing on special signals to exchange orders and instructions among the surveillance team 
members. 

7) Knowing the measures to be taken when the target is lost, such as contacting the leaders or 
something else agreed upon. 

8) It is not permitted to carry any weapons during the information gathering process. 

9) It is preferable to have a camera with the surveillance man in case the target is to personally 
contact others. 

Surveillance by car: 

Surveillance by car requires taking certain measures: 

1) Inspecting the car's fuel, water, and lights. 

2) The car should be of a common type so it would not attract people's attention. 

3) The car should be in good condition and the driver should be experienced. 

4) The car plates should not contain real numbers. It is important to use a false license plate and 
small numbers in order to prevent anyone from spotting and memorizing it. 

5) The car's interior light should be disabled in order to hide the identity of the surveillance team 
members sitting inside. 

6) The number and appearance of the car surveillance team members should match those of the 
target's car. 

Performing Surveillance by Car: 

1) The car being used for surveillance should keep up with the target’s car during the 
surveillance operation, especially in crowded areas and on side streets. The distance between the 
two cars depends on the circumstances. 

2) If the target gets out of his car and starts to walk, one of the surveillance team members should 



get out and observe him. 

3) Follow all aforementioned measures for surveillance on foot. 


Exercises to detect surveillance by car: 

1) The surveillance car speeds up then stops suddenly while observing which other car is 
affected (this is done where there is not a lot of traffic). 

2) The surveillance car enters a dead-end street. 

3) The surveillance car goes in the opposite direction of traffic. 

4) The surveillance car stops and goes backwards. 

5) [The surveillance car] enters a parking lot and immediately goes out. 

6) [The surveillance car] takes a side road and stops. 

Surveillance, Intelligence, and Observation (Information about the enemy places) 

The Organization’s command needs detailed information about the enemy's vital establishments, 
whether civilian or military, in order to make safe plans, reach firm decisions, and avoid 
surprises. Thus, the individual who gathers information about a desired location should, in 
addition to drawing a diagram, describe it and all its details. 

The Drawing: The brother should draw a diagram of the area, the street, and the location which 
is the target of the information-gathering. He should describe its shape and characteristics. The 
drawing should be realistic so that someone who never saw the location could visualize it. It is 
preferable to also put on the drawing the directions of traffic, police stations, and security 
centers. 

The Description: It is necessary to gather as much information about the location as possible. 
For instance: 

1) Traffic directions and how wide the streets are 

2) Transportation leading to the location 

3) The area, appearance, and setting of the place 

4) Traffic signals and pedestrian areas 

5) Security personnel centers and government agencies 

6) Embassies and consulates 

7) The economic characteristics of the area and traffic congestion times 

8) Public parks 

9) Amount and location of lighting 

It is preferable to photograph the area as a whole first, then the street of the [desired] location. If 
possible, panoramic pictures should be taken. That is, the collection of views should be 
continuous in a such way that all pictures are taken 

from one location and that the ending of one picture is the beginning of the next. The 



photographer should be experienced with and proficient in film processing and developing. It is 
risky to use an outside film processing service. When 

observing a military installation or camp, we discourage taking pictures where it is forbidden. 

The brother/photographer should use a modem camera that can photograph at night or from a 
distance, and only the lens of the camera should be visible. When gathering information about a 
military camp, the brother should draw a diagram of the camp’s overall area, the camp itself, and 
its interior, if possible 

The description of the base or camp must contain the following: 

1) Location 

2) Exterior shape 

3) Transportation to it 

4) Space [area] 

5) Weapons used 

6) Unit using the camp 

7) Fortifications and tunnels 

8) Guard posts 

9) Amount and periods of lighting 

10) Number of soldiers and officers. Officers' ranks 

11) Ammunition depot locations 

12) Vehicles and automobiles 

13) Leave policy 

14) Commander name, rank, arrival and departure times 

15) Degree and speed of mobilization 

16) Brigades and names of companies 

17) Sleeping and waking times 

18) Telephone lines and means of communication 

The brother gathering the information may start a friendship with one of the soldiers or officers 
of that base. Information may be collected gradually and easily from soldiers when giving them 
rides from the camp to the bus or train stations, etc. 

Gathering Information Through Interrogation: 

Security personnel in our countries arrest brothers and obtain the needed information through 
interrogation and torture. The Military Organization must do likewise. On one hand, the 
Organization can obtain important information about enemy establishments and personnel. On 
the other hand, that is a form of necessary punishment. Information is collected in this method by 
kidnaping an enemy individual, interrogating him, and torturing him. This source of information 
is not permanent. Also, caution should be exercised about being deceived by misinformation 
from enemy individuals. Thus, the brother who interrogates the hostage should possess the 
following characteristics: 

1) Should have knowledge and expertise about people's behavior and morals. 

2) Should have a strong personality. 

3) Should possess a sixth sense based on practice and experience. 



4) Should be extremely patient. 

5) Should be able to act, pretend, and mask himself. 

6) Should be intelligent, observant, analytical, and deductive. 

7) Should be able to establish an investigative plan. 

Gathering Information Through Recruitment: 

Recruiting agents is the most dangerous task that an enlisted brother can perform. Because of this 
dangerous task, the brother may be killed or imprisoned. Thus, the recruitment task must be 
performed by special types of members. There are a number of motives that might entice an 
uncommitted person to take part in intelligence work. 

These motives are: 

1) Coercion and entanglement 

2) Greed and love for money 

3) Displaying courage and love of adventure 

4) Love of amusement and deviance 

5) Mental and political orientation 

6) Fear of being harmed 

The Organization may use motives No. 2, 3, 5, and 6 in recruitment. 


Summary of Books and Guides of the Enemy: 

Rules for Radicals - Saul Alinsky 
Das Kapital - Karl Marx 
The Little Red Book - Mao Zedong 
„Open Society" Strategy Documents 
United Nations Agenda 21, 2030 etc. 

The Protocols of the Elders of Zion (unclear origin but 
nevertheless studied by the Enemy) 


II. War Tactics and Background Knowledge from Neutral, Historical or Allied Sources 

The following list of books is recommended as background information for the more knowledge 
hungry leadership forces: 

100 Years Together - Alexander Solzhenitsyn 
The International Jew - Henry Ford 
On War - General Carl von Clausewitz 
The Art of War - Sun Tzu 
New Lies for Old - Anatoliy Golitysn 
Online Resources and Databanks 31: 

IT IS A PRIORITY TO SAVE THESE RESOURCES AND COPY THEM SO THAT THE 



DATA IS MIRRORED OFFLINE. DO NOT ACCESS THESE RESOURCES WITHOUT 
INITIAL OPSEC PRECAUTIONS OR FULL COMMITTMENT TO THE CAUSE. It is ideal 
that this manual be given to you in a printed version, although you should remain calm, focused 
and determined until the final victory if it has been given to you via an online source. 

1) https://archive.org/details/military-manuals 

Military Manuals - booby traps, improvised munitions, unconventional warfare devices and 
techniques, marksmanship and ballistics 

2) https://8ch.net/pdfs/res/6071 ,html#9096 

The Terrorist's Handbook - A definitive guide to manufacturing most weapons and materials 
needed for active resistance measures. Do not let the name confuse you, as an SS member your 
aims are noble and your motives pure. Terror is not to be strived towards, rather victory is. Do 
not allow your enemy to label you as a terrorist thereby granting them power. If seeking a 
name for this handbook in discussion it is recommended to frame it as ..Resistance Fighter” or 
..Freedom Fighter” Handbook. 

31 Warning: these resources should be downloaded and stored on a safe medium preferably in a 
radiation proofed room (i.e. Faraday cage, concrete walled basement or bunker). The enemy has 
been attacking archival services and therefore the saving of online resources is to be prioritized. 

3) 

https://web.archive.Org/web/20080302034604/http://www.bellum.nu:80/literature/tacayan.html 
CIA psyops in guerilla warfare. 

4) 

https://web.archive.org/web/20080228200118/http://www.bellum.nu:80/literature.html 
Classic tomes on conventional warfare theory, modem ones on guerilla warfare tactics 

5) https://8ch.net/k/res/480825.html#557006 

Scientific Principles of Improvised Warfare and Home Defense, 

Volumes 1-6 

6) https://8ch.net/k/res/480825.html#555519 

To Break a Tyrant's Chains 

7) https://8ch.net/k/res/480825.html#480994 
Rhodesian Drake Shooting 

8) https://www.survivalschool.us/survival-info/militarymanuals-pdf/ 

Almost every U.S. ZOG Field Manual and Training Manual 


9) https://archive.fo/qPAPo 



A summary and discussion of many of the above resources. This list can be extended or 
shortened as a result of personal research into the topics mentioned. On the following page a 
definitive introduction into classical National Socialist ideology is presented. It is essential that 
every single person understand and form their own beliefs and being, in order to be able to 
combine and rationally, yet critically, analyze as many different perspectives as possible. This, 
after all, is the purpose behind Idealism: the development of the human thought process and 
striving for perfect truth und its natural consequences and idealized systems. 



THE LITERATE 

NATSOC